| audit-libs |
CVE-2015-5186 |
MEDIUM |
2.8.5-4.el7 |
|
http://www.openwall.com/lists/oss-security/2015/08/13/9
http://www.securityfocus.com/bid/76840
https://access.redhat.com/security/cve/CVE-2015-5186
https://bugzilla.redhat.com/show_bug.cgi?id=1251621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5186
https://fedorahosted.org/audit/changeset/1122
https://nvd.nist.gov/vuln/detail/CVE-2015-5186
https://people.redhat.com/sgrubb/audit/ChangeLog
https://www.cve.org/CVERecord?id=CVE-2015-5186
|
| bash |
CVE-2012-6711 |
MEDIUM |
4.2.46-35.el7_9 |
|
http://git.savannah.gnu.org/cgit/bash.git/commit/?h=devel&id=863d31ae775d56b785dc5b0105b6d251515d81d5
http://www.securityfocus.com/bid/108824
https://access.redhat.com/security/cve/CVE-2012-6711
https://bugzilla.redhat.com/show_bug.cgi?id=1721071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6711
https://nvd.nist.gov/vuln/detail/CVE-2012-6711
https://support.f5.com/csp/article/K05122252
https://support.f5.com/csp/article/K05122252?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4180-1
https://usn.ubuntu.com/4180-1/
https://www.cve.org/CVERecord?id=CVE-2012-6711
|
| bash |
CVE-2019-18276 |
LOW |
4.2.46-35.el7_9 |
|
http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html
https://access.redhat.com/security/cve/CVE-2019-18276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276
https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff
https://linux.oracle.com/cve/CVE-2019-18276.html
https://linux.oracle.com/errata/ELSA-2021-1679.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-18276
https://security.gentoo.org/glsa/202105-34
https://security.netapp.com/advisory/ntap-20200430-0003/
https://ubuntu.com/security/notices/USN-5380-1
https://www.cve.org/CVERecord?id=CVE-2019-18276
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.youtube.com/watch?v=-wGtxJ8opa8
|
| bind-license |
CVE-2023-4408 |
HIGH |
32:9.11.4-26.P2.el7_9.15 |
|
http://www.openwall.com/lists/oss-security/2024/02/13/1
https://access.redhat.com/security/cve/CVE-2023-4408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408
https://kb.isc.org/docs/cve-2023-4408
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://nvd.nist.gov/vuln/detail/CVE-2023-4408
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://www.cve.org/CVERecord?id=CVE-2023-4408
|
| bind-license |
CVE-2023-50387 |
HIGH |
32:9.11.4-26.P2.el7_9.15 |
|
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:0977
https://access.redhat.com/security/cve/CVE-2023-50387
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/9/ALSA-2024-0977.html
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50387
https://linux.oracle.com/cve/CVE-2023-50387.html
https://linux.oracle.com/errata/ELSA-2024-0977.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
https://news.ycombinator.com/item?id=39367411
https://news.ycombinator.com/item?id=39372384
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50387
https://security.netapp.com/advisory/ntap-20240307-0007/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6665-1
https://www.athene-center.de/aktuelles/key-trap
https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
https://www.cve.org/CVERecord?id=CVE-2023-50387
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
|
| bind-license |
CVE-2023-50868 |
HIGH |
32:9.11.4-26.P2.el7_9.15 |
|
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:0977
https://access.redhat.com/security/cve/CVE-2023-50868
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://datatracker.ietf.org/doc/html/rfc5155
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/9/ALSA-2024-0977.html
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50868
https://linux.oracle.com/cve/CVE-2023-50868.html
https://linux.oracle.com/errata/ELSA-2024-0977.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50868
https://security.netapp.com/advisory/ntap-20240307-0008/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6665-1
https://www.cve.org/CVERecord?id=CVE-2023-50868
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
|
| bind-license |
CVE-2023-5517 |
HIGH |
32:9.11.4-26.P2.el7_9.15 |
|
http://www.openwall.com/lists/oss-security/2024/02/13/1
https://access.redhat.com/security/cve/CVE-2023-5517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517
https://kb.isc.org/docs/cve-2023-5517
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://nvd.nist.gov/vuln/detail/CVE-2023-5517
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://www.cve.org/CVERecord?id=CVE-2023-5517
|
| bind-license |
CVE-2023-6516 |
HIGH |
32:9.11.4-26.P2.el7_9.15 |
|
http://www.openwall.com/lists/oss-security/2024/02/13/1
https://access.redhat.com/security/cve/CVE-2023-6516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516
https://kb.isc.org/docs/cve-2023-6516
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://nvd.nist.gov/vuln/detail/CVE-2023-6516
https://ubuntu.com/security/notices/USN-6642-1
https://www.cve.org/CVERecord?id=CVE-2023-6516
|
| bind-license |
CVE-2021-25219 |
MEDIUM |
32:9.11.4-26.P2.el7_9.15 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25219.json
https://access.redhat.com/security/cve/CVE-2021-25219
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219
https://errata.almalinux.org/8/ALSA-2022-2092.html
https://kb.isc.org/docs/cve-2021-25219
https://kb.isc.org/v1/docs/cve-2021-25219
https://linux.oracle.com/cve/CVE-2021-25219.html
https://linux.oracle.com/errata/ELSA-2022-2092.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/
https://nvd.nist.gov/vuln/detail/CVE-2021-25219
https://security.gentoo.org/glsa/202210-25
https://security.netapp.com/advisory/ntap-20211118-0002/
https://ubuntu.com/security/notices/USN-5126-1
https://ubuntu.com/security/notices/USN-5126-2
https://www.cve.org/CVERecord?id=CVE-2021-25219
https://www.debian.org/security/2021/dsa-4994
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| bind-license |
CVE-2022-3094 |
MEDIUM |
32:9.11.4-26.P2.el7_9.15 |
|
https://access.redhat.com/errata/RHSA-2023:2261
https://access.redhat.com/security/cve/CVE-2022-3094
https://bugzilla.redhat.com/2128584
https://bugzilla.redhat.com/2164032
https://bugzilla.redhat.com/2164038
https://bugzilla.redhat.com/2164039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094
https://errata.almalinux.org/9/ALSA-2023-2261.html
https://kb.isc.org/docs/cve-2022-3094
https://linux.oracle.com/cve/CVE-2022-3094.html
https://linux.oracle.com/errata/ELSA-2023-7177.html
https://nvd.nist.gov/vuln/detail/CVE-2022-3094
https://ubuntu.com/security/notices/USN-5827-1
https://www.cve.org/CVERecord?id=CVE-2022-3094
|
| bind-license |
CVE-2013-5661 |
LOW |
32:9.11.4-26.P2.el7_9.15 |
|
https://access.redhat.com/security/cve/CVE-2013-5661
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5661
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-5661
https://nvd.nist.gov/vuln/detail/CVE-2013-5661
https://security-tracker.debian.org/tracker/CVE-2013-5661
https://www.cve.org/CVERecord?id=CVE-2013-5661
|
| bind-license |
CVE-2016-6170 |
LOW |
32:9.11.4-26.P2.el7_9.15 |
|
http://www.openwall.com/lists/oss-security/2016/07/06/3
http://www.securityfocus.com/bid/91611
http://www.securitytracker.com/id/1036241
https://access.redhat.com/security/cve/CVE-2016-6170
https://bugzilla.redhat.com/show_bug.cgi?id=1353563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170
https://github.com/sischkg/xfer-limit/blob/master/README.md
https://gitlab.isc.org/isc-projects/bind9/-/commit/5f8412a4cb5ee14a0e8cddd4107854b40ee3291e
https://kb.isc.org/article/AA-01390
https://kb.isc.org/article/AA-01390/0/Operational-Notification%3A-A-party-that-is-allowed-control-over-zone-data-can-overwhelm-a-server-by-transferring-huge-quantities-of-data.html
https://kb.isc.org/article/AA-01390/169/CVE-2016-6170
https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html
https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015073.html
https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015075.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6170
https://security.gentoo.org/glsa/201610-07
https://ubuntu.com/security/notices/USN-5747-1
https://www.cve.org/CVERecord?id=CVE-2016-6170
|
| binutils |
CVE-2017-6965 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-6965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965
https://nvd.nist.gov/vuln/detail/CVE-2017-6965
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21137
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-6965
|
| binutils |
CVE-2017-6966 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-6966
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966
https://nvd.nist.gov/vuln/detail/CVE-2017-6966
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21139
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-6966
|
| binutils |
CVE-2018-20673 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20673
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
https://www.cve.org/CVERecord?id=CVE-2018-20673
|
| binutils |
CVE-2019-9074 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-9074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074
https://nvd.nist.gov/vuln/detail/CVE-2019-9074
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24235
https://support.f5.com/csp/article/K09092524
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-9074
|
| binutils |
CVE-2019-9075 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-9075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075
https://nvd.nist.gov/vuln/detail/CVE-2019-9075
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24236
https://support.f5.com/csp/article/K42059040
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-9075
|
| binutils |
CVE-2019-9077 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/107139
https://access.redhat.com/security/cve/CVE-2019-9077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077
https://nvd.nist.gov/vuln/detail/CVE-2019-9077
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20190314-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=24243
https://support.f5.com/csp/article/K00056379
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-9077
|
| binutils |
CVE-2020-16590 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-16590
https://nvd.nist.gov/vuln/detail/CVE-2020-16590
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25821
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
https://www.cve.org/CVERecord?id=CVE-2020-16590
|
| binutils |
CVE-2020-16592 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-16592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/
https://nvd.nist.gov/vuln/detail/CVE-2020-16592
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25823
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a
https://ubuntu.com/security/notices/USN-5124-1
https://www.cve.org/CVERecord?id=CVE-2020-16592
|
| binutils |
CVE-2021-20197 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2021-20197
https://bugzilla.redhat.com/show_bug.cgi?id=1913743
https://linux.oracle.com/cve/CVE-2021-20197.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20197
https://security.gentoo.org/glsa/202208-30
https://security.netapp.com/advisory/ntap-20210528-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=26945
https://www.cve.org/CVERecord?id=CVE-2021-20197
|
| binutils |
CVE-2021-20294 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2021-20294
https://bugzilla.redhat.com/show_bug.cgi?id=1943533
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2021-20294
https://security.gentoo.org/glsa/202208-30
https://sourceware.org/bugzilla/show_bug.cgi?id=26929
https://sourceware.org/git/?p=binutils-gdb.git%3Ba=patch%3Bh=372dd157272e0674d13372655cc60eaca9c06926
https://www.cve.org/CVERecord?id=CVE-2021-20294
|
| binutils |
CVE-2021-37322 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2021-37322
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37322
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188
https://nvd.nist.gov/vuln/detail/CVE-2021-37322
https://www.cve.org/CVERecord?id=CVE-2021-37322
|
| binutils |
CVE-2021-45078 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2021-45078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/
https://nvd.nist.gov/vuln/detail/CVE-2021-45078
https://security.gentoo.org/glsa/202208-30
https://security.netapp.com/advisory/ntap-20220107-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=28694
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=161e87d12167b1e36193385485c1f6ce92f74f02
https://ubuntu.com/security/notices/USN-5341-1
https://ubuntu.com/security/notices/USN-6160-1
https://www.cve.org/CVERecord?id=CVE-2021-45078
|
| binutils |
CVE-2022-4285 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/errata/RHSA-2023:6593
https://access.redhat.com/security/cve/CVE-2022-4285
https://bugzilla.redhat.com/2150768
https://bugzilla.redhat.com/show_bug.cgi?id=2150768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4285
https://errata.almalinux.org/9/ALSA-2023-6593.html
https://errata.rockylinux.org/RLSA-2023:6236
https://linux.oracle.com/cve/CVE-2022-4285.html
https://linux.oracle.com/errata/ELSA-2023-6593.html
https://nvd.nist.gov/vuln/detail/CVE-2022-4285
https://security.gentoo.org/glsa/202309-15
https://sourceware.org/bugzilla/show_bug.cgi?id=29699
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5c831a3c7f3ca98d6aba1200353311e1a1f84c70
https://ubuntu.com/security/notices/USN-6544-1
https://www.cve.org/CVERecord?id=CVE-2022-4285
|
| binutils |
CVE-2023-1579 |
MEDIUM |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2023-1579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1579
https://nvd.nist.gov/vuln/detail/CVE-2023-1579
https://security.gentoo.org/glsa/202309-15
https://security.netapp.com/advisory/ntap-20230511-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=29988
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8
https://ubuntu.com/security/notices/USN-6101-1
https://www.cve.org/CVERecord?id=CVE-2023-1579
|
| binutils |
CVE-2014-9939 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2015/07/31/6
https://access.redhat.com/security/cve/CVE-2014-9939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9939
https://nvd.nist.gov/vuln/detail/CVE-2014-9939
https://sourceware.org/bugzilla/show_bug.cgi?id=18750
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7e27a9d5f22f9f7ead11738b1546d0b5c737266b
https://ubuntu.com/security/notices/USN-3367-1
https://www.cve.org/CVERecord?id=CVE-2014-9939
|
| binutils |
CVE-2015-8538 |
LOW |
2.27-44.base.el7_9.1 |
|
http://sourceforge.net/p/libdwarf/code/ci/da724a0bc5eec8e9ec0b0cb0c238a80e34466459/
http://www.openwall.com/lists/oss-security/2015/12/09/2
http://www.openwall.com/lists/oss-security/2015/12/10/3
https://access.redhat.com/security/cve/CVE-2015-8538
https://bugzilla.redhat.com/show_bug.cgi?id=1289385
https://bugzilla.redhat.com/show_bug.cgi?id=1291299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8538
https://nvd.nist.gov/vuln/detail/CVE-2015-8538
https://www.cve.org/CVERecord?id=CVE-2015-8538
|
| binutils |
CVE-2016-2226 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://nvd.nist.gov/vuln/detail/CVE-2016-2226
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-2226
https://www.exploit-db.com/exploits/42386/
|
| binutils |
CVE-2016-4487 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4487
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4487
|
| binutils |
CVE-2016-4488 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4488
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4488
|
| binutils |
CVE-2016-4489 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://nvd.nist.gov/vuln/detail/CVE-2016-4489
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4489
|
| binutils |
CVE-2016-4490 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://nvd.nist.gov/vuln/detail/CVE-2016-4490
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4490
|
| binutils |
CVE-2016-4491 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4491
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4491
|
| binutils |
CVE-2016-4492 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=03ef0c6c55ab81002abef62cec430d0496c3a01c
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4492
|
| binutils |
CVE-2016-4493 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4493
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4493
|
| binutils |
CVE-2017-12449 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-12449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12449
https://nvd.nist.gov/vuln/detail/CVE-2017-12449
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-12449
|
| binutils |
CVE-2017-12451 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-12451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12451
https://nvd.nist.gov/vuln/detail/CVE-2017-12451
https://sourceware.org/bugzilla/show_bug.cgi?id=21786
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-12451
|
| binutils |
CVE-2017-12452 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-12452
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12452
https://nvd.nist.gov/vuln/detail/CVE-2017-12452
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-12452
|
| binutils |
CVE-2017-12453 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-12453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12453
https://nvd.nist.gov/vuln/detail/CVE-2017-12453
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-12453
|
| binutils |
CVE-2017-12454 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-12454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12454
https://nvd.nist.gov/vuln/detail/CVE-2017-12454
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-12454
|
| binutils |
CVE-2017-12455 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-12455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12455
https://nvd.nist.gov/vuln/detail/CVE-2017-12455
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-12455
|
| binutils |
CVE-2017-12456 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-12456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12456
https://nvd.nist.gov/vuln/detail/CVE-2017-12456
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21813
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-12456
|
| binutils |
CVE-2017-12457 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-12457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12457
https://nvd.nist.gov/vuln/detail/CVE-2017-12457
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-12457
|
| binutils |
CVE-2017-12458 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-12458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12458
https://nvd.nist.gov/vuln/detail/CVE-2017-12458
https://sourceware.org/bugzilla/show_bug.cgi?id=21840
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-12458
|
| binutils |
CVE-2017-12799 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/100292
https://access.redhat.com/security/cve/CVE-2017-12799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12799
https://nvd.nist.gov/vuln/detail/CVE-2017-12799
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21933
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-12799
|
| binutils |
CVE-2017-12967 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/100462
https://access.redhat.com/security/cve/CVE-2017-12967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12967
https://nvd.nist.gov/vuln/detail/CVE-2017-12967
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21962
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-12967
|
| binutils |
CVE-2017-13710 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/100499
https://access.redhat.com/security/cve/CVE-2017-13710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13710
https://nvd.nist.gov/vuln/detail/CVE-2017-13710
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0c54f69295208331faab9bc5e995111a35672f9b
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0c54f69295208331faab9bc5e995111a35672f9b
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d6f8dea6798528de0fc762409595251eeeb1f547
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-13710
|
| binutils |
CVE-2017-13716 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-13716
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716
https://nvd.nist.gov/vuln/detail/CVE-2017-13716
https://sourceware.org/bugzilla/show_bug.cgi?id=22009
https://www.cve.org/CVERecord?id=CVE-2017-13716
|
| binutils |
CVE-2017-13757 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/100532
https://access.redhat.com/security/cve/CVE-2017-13757
https://nvd.nist.gov/vuln/detail/CVE-2017-13757
https://sourceware.org/bugzilla/show_bug.cgi?id=22018
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=90efb6422939ca031804266fba669f77c22a274a
https://www.cve.org/CVERecord?id=CVE-2017-13757
|
| binutils |
CVE-2017-14128 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/100623
https://access.redhat.com/security/cve/CVE-2017-14128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14128
https://nvd.nist.gov/vuln/detail/CVE-2017-14128
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22059
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7e8b60085eb3e6f2c41bc0c00c0d759fa7f72780
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e8b60085eb3e6f2c41bc0c00c0d759fa7f72780
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-14128
|
| binutils |
CVE-2017-14129 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/100624
https://access.redhat.com/security/cve/CVE-2017-14129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14129
https://nvd.nist.gov/vuln/detail/CVE-2017-14129
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22047
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=e4f2723003859dc6b33ca0dadbc4a7659ebf1643
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e4f2723003859dc6b33ca0dadbc4a7659ebf1643
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-14129
|
| binutils |
CVE-2017-14130 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/100625
https://access.redhat.com/security/cve/CVE-2017-14130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14130
https://nvd.nist.gov/vuln/detail/CVE-2017-14130
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22058
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=2a143b99fc4a5094a9cf128f3184d8e6818c8229
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=2a143b99fc4a5094a9cf128f3184d8e6818c8229
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-14130
|
| binutils |
CVE-2017-14529 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-14529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14529
https://nvd.nist.gov/vuln/detail/CVE-2017-14529
https://sourceware.org/bugzilla/show_bug.cgi?id=22113
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=4d465c689a8fb27212ef358d0aee89d60dee69a6
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=dcaaca89e8618eba35193c27afcb1cfa54f74582
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4d465c689a8fb27212ef358d0aee89d60dee69a6
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=dcaaca89e8618eba35193c27afcb1cfa54f74582
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-14529
|
| binutils |
CVE-2017-14729 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-14729
https://blogs.gentoo.org/ago/2017/09/25/binutils-heap-based-buffer-overflow-in-_bfd_x86_elf_get_synthetic_symtab-elfxx-x86-c/
https://nvd.nist.gov/vuln/detail/CVE-2017-14729
https://sourceware.org/bugzilla/show_bug.cgi?id=22170
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=56933f9e3e90eebf1018ed7417d6c1184b91db6b
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=61e3bf5f83f7e505b6bc51ef65426e5b31e6e360
https://www.cve.org/CVERecord?id=CVE-2017-14729
|
| binutils |
CVE-2017-14745 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-14745
https://nvd.nist.gov/vuln/detail/CVE-2017-14745
https://sourceware.org/bugzilla/show_bug.cgi?id=22148
https://www.cve.org/CVERecord?id=CVE-2017-14745
|
| binutils |
CVE-2017-14930 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-14930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14930
https://nvd.nist.gov/vuln/detail/CVE-2017-14930
https://sourceware.org/bugzilla/show_bug.cgi?id=22191
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a26a013f22a19e2c16729e64f40ef8a7dfcc086e
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-14930
|
| binutils |
CVE-2017-14932 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-14932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14932
https://nvd.nist.gov/vuln/detail/CVE-2017-14932
https://sourceware.org/bugzilla/show_bug.cgi?id=22204
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=e338894dc2e603683bed2172e8e9f25b29051005
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-14932
|
| binutils |
CVE-2017-14933 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/101203
https://access.redhat.com/security/cve/CVE-2017-14933
https://nvd.nist.gov/vuln/detail/CVE-2017-14933
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22210
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=33e0a9a056bd23e923b929a4f2ab049ade0b1c32
https://www.cve.org/CVERecord?id=CVE-2017-14933
|
| binutils |
CVE-2017-14934 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/101204
https://access.redhat.com/security/cve/CVE-2017-14934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14934
https://nvd.nist.gov/vuln/detail/CVE-2017-14934
https://sourceware.org/bugzilla/show_bug.cgi?id=22219
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=19485196044b2521af979f1e5c4a89bfb90fba0b
https://www.cve.org/CVERecord?id=CVE-2017-14934
|
| binutils |
CVE-2017-14938 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/101212
https://access.redhat.com/security/cve/CVE-2017-14938
https://blogs.gentoo.org/ago/2017/09/26/binutils-memory-allocation-failure-in-_bfd_elf_slurp_version_tables-elf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14938
https://nvd.nist.gov/vuln/detail/CVE-2017-14938
https://sourceware.org/bugzilla/show_bug.cgi?id=22166
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=bd61e135492ecf624880e6b78e5fcde3c9716df6
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-14938
|
| binutils |
CVE-2017-14939 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/101216
https://access.redhat.com/security/cve/CVE-2017-14939
https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-read_1_byte-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14939
https://nvd.nist.gov/vuln/detail/CVE-2017-14939
https://sourceware.org/bugzilla/show_bug.cgi?id=22169
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=515f23e63c0074ab531bc954f84ca40c6281a724
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-14939
https://www.exploit-db.com/exploits/42970/
|
| binutils |
CVE-2017-14940 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-14940
https://blogs.gentoo.org/ago/2017/09/26/binutils-null-pointer-dereference-in-scan_unit_for_symbols-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14940
https://nvd.nist.gov/vuln/detail/CVE-2017-14940
https://sourceware.org/bugzilla/show_bug.cgi?id=22166
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0d76029f92182c3682d8be2c833d45bc9a2068fe
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-14940
|
| binutils |
CVE-2017-14974 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-14974
https://nvd.nist.gov/vuln/detail/CVE-2017-14974
https://sourceware.org/bugzilla/show_bug.cgi?id=22163
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=e70c19e3a4c26e9c1ebf0c9170d105039b56d7cf
https://www.cve.org/CVERecord?id=CVE-2017-14974
|
| binutils |
CVE-2017-15020 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-15020
https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15020
https://nvd.nist.gov/vuln/detail/CVE-2017-15020
https://sourceware.org/bugzilla/show_bug.cgi?id=22202
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=1da5c9a485f3dcac4c45e96ef4b7dae5948314b5
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-15020
|
| binutils |
CVE-2017-15021 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-15021
https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-bfd_getl32-opncls-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15021
https://nvd.nist.gov/vuln/detail/CVE-2017-15021
https://sourceware.org/bugzilla/show_bug.cgi?id=22197
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=52b36c51e5bf6d7600fdc6ba115b170b0e78e31d
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-15021
|
| binutils |
CVE-2017-15022 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-15022
https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15022
https://nvd.nist.gov/vuln/detail/CVE-2017-15022
https://sourceware.org/bugzilla/show_bug.cgi?id=22201
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11855d8a1f11b102a702ab76e95b22082cccf2f8
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-15022
|
| binutils |
CVE-2017-15023 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/101611
https://access.redhat.com/security/cve/CVE-2017-15023
https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/
https://nvd.nist.gov/vuln/detail/CVE-2017-15023
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22200
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c361faae8d964db951b7100cada4dcdc983df1bf
https://www.cve.org/CVERecord?id=CVE-2017-15023
|
| binutils |
CVE-2017-15024 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-15024
https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15024
https://nvd.nist.gov/vuln/detail/CVE-2017-15024
https://sourceware.org/bugzilla/show_bug.cgi?id=22187
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=52a93b95ec0771c97e26f0bb28630a271a667bd2
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-15024
|
| binutils |
CVE-2017-15025 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-15025
https://blogs.gentoo.org/ago/2017/10/03/binutils-divide-by-zero-in-decode_line_info-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15025
https://nvd.nist.gov/vuln/detail/CVE-2017-15025
https://sourceware.org/bugzilla/show_bug.cgi?id=22186
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d8010d3e75ec7194a4703774090b27486b742d48
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-15025
|
| binutils |
CVE-2017-15225 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-15225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15225
https://nvd.nist.gov/vuln/detail/CVE-2017-15225
https://sourceware.org/bugzilla/show_bug.cgi?id=22212
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b55ec8b676ed05d93ee49d6c79ae0403616c4fb0
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-15225
|
| binutils |
CVE-2017-15938 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/101610
https://access.redhat.com/security/cve/CVE-2017-15938
https://blogs.gentoo.org/ago/2017/10/24/binutils-invalid-memory-read-in-find_abstract_instance_name-dwarf2-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15938
https://nvd.nist.gov/vuln/detail/CVE-2017-15938
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22209
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=1b86808a86077722ee4f42ff97f836b12420bb2a
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-15938
|
| binutils |
CVE-2017-15939 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/101613
https://access.redhat.com/security/cve/CVE-2017-15939
https://blogs.gentoo.org/ago/2017/10/24/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c-incomplete-fix-for-cve-2017-15023/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15939
https://nvd.nist.gov/vuln/detail/CVE-2017-15939
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22205
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=a54018b72d75abf2e74bf36016702da06399c1d9
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-15939
|
| binutils |
CVE-2017-15996 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/101608
https://access.redhat.com/security/cve/CVE-2017-15996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15996
https://nvd.nist.gov/vuln/detail/CVE-2017-15996
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=22361
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d91f0b20e561e326ee91a09a76206257bde8438b
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-15996
|
| binutils |
CVE-2017-16826 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-16826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16826
https://nvd.nist.gov/vuln/detail/CVE-2017-16826
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22376
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=a67d66eb97e7613a38ffe6622d837303b3ecd31d
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-16826
|
| binutils |
CVE-2017-16827 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-16827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16827
https://nvd.nist.gov/vuln/detail/CVE-2017-16827
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22306
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0301ce1486b1450f219202677f30d0fa97335419
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-16827
|
| binutils |
CVE-2017-16828 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-16828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16828
https://nvd.nist.gov/vuln/detail/CVE-2017-16828
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22386
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-16828
|
| binutils |
CVE-2017-16829 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-16829
https://nvd.nist.gov/vuln/detail/CVE-2017-16829
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22307
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=cf54ebff3b7361989712fd9c0128a9b255578163
https://www.cve.org/CVERecord?id=CVE-2017-16829
|
| binutils |
CVE-2017-16830 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/101941
https://access.redhat.com/security/cve/CVE-2017-16830
https://nvd.nist.gov/vuln/detail/CVE-2017-16830
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22384
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4
https://www.cve.org/CVERecord?id=CVE-2017-16830
|
| binutils |
CVE-2017-16831 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-16831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16831
https://nvd.nist.gov/vuln/detail/CVE-2017-16831
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22385
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-16831
|
| binutils |
CVE-2017-16832 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-16832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16832
https://nvd.nist.gov/vuln/detail/CVE-2017-16832
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22373
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=0bb6961f18b8e832d88b490d421ca56cea16c45b
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-16832
|
| binutils |
CVE-2017-17080 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-17080
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17080
https://nvd.nist.gov/vuln/detail/CVE-2017-17080
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22421
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-17080
|
| binutils |
CVE-2017-17121 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-17121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17121
https://nvd.nist.gov/vuln/detail/CVE-2017-17121
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22506
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b23dc97fe237a1d9e850d7cbeee066183a00630b
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-17121
|
| binutils |
CVE-2017-17122 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-17122
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122
https://nvd.nist.gov/vuln/detail/CVE-2017-17122
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22508
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=d785b7d4b877ed465d04072e17ca19d0f47d840f
https://ubuntu.com/security/notices/USN-5341-1
https://ubuntu.com/security/notices/USN-6413-1
https://www.cve.org/CVERecord?id=CVE-2017-17122
|
| binutils |
CVE-2017-17123 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-17123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17123
https://nvd.nist.gov/vuln/detail/CVE-2017-17123
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22509
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=4581a1c7d304ce14e714b27522ebf3d0188d6543
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-17123
|
| binutils |
CVE-2017-17124 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-17124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17124
https://nvd.nist.gov/vuln/detail/CVE-2017-17124
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22507
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=b0029dce6867de1a2828293177b0e030d2f0f03c
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-17124
|
| binutils |
CVE-2017-17125 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-17125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17125
https://nvd.nist.gov/vuln/detail/CVE-2017-17125
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22443
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=160b1a618ad94988410dc81fce9189fcda5b7ff4
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-17125
|
| binutils |
CVE-2017-17126 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-17126
https://nvd.nist.gov/vuln/detail/CVE-2017-17126
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22510
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=f425ec6600b69e39eb605f3128806ff688137ea8
https://www.cve.org/CVERecord?id=CVE-2017-17126
|
| binutils |
CVE-2017-6969 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2017/03/16/8
http://www.securityfocus.com/bid/97065
https://access.redhat.com/security/cve/CVE-2017-6969
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969
https://nvd.nist.gov/vuln/detail/CVE-2017-6969
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21156
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-6969
|
| binutils |
CVE-2017-7209 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/96994
https://access.redhat.com/security/cve/CVE-2017-7209
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209
https://nvd.nist.gov/vuln/detail/CVE-2017-7209
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21135
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-7209
|
| binutils |
CVE-2017-7210 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/96992
https://access.redhat.com/security/cve/CVE-2017-7210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210
https://nvd.nist.gov/vuln/detail/CVE-2017-7210
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21157
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-7210
|
| binutils |
CVE-2017-7223 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-7223
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7223
https://nvd.nist.gov/vuln/detail/CVE-2017-7223
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20898
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-7223
|
| binutils |
CVE-2017-7224 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/97277
https://access.redhat.com/security/cve/CVE-2017-7224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7224
https://nvd.nist.gov/vuln/detail/CVE-2017-7224
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20892
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-7224
|
| binutils |
CVE-2017-7225 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/97275
https://access.redhat.com/security/cve/CVE-2017-7225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7225
https://nvd.nist.gov/vuln/detail/CVE-2017-7225
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20891
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-7225
|
| binutils |
CVE-2017-7226 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-7226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7226
https://nvd.nist.gov/vuln/detail/CVE-2017-7226
https://sourceware.org/bugzilla/show_bug.cgi?id=20905
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-7226
|
| binutils |
CVE-2017-7227 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/97209
https://access.redhat.com/security/cve/CVE-2017-7227
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7227
https://nvd.nist.gov/vuln/detail/CVE-2017-7227
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20906
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-7227
|
| binutils |
CVE-2017-7299 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/97217
https://access.redhat.com/security/cve/CVE-2017-7299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7299
https://nvd.nist.gov/vuln/detail/CVE-2017-7299
https://sourceware.org/bugzilla/show_bug.cgi?id=20908
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-7299
|
| binutils |
CVE-2017-7300 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/97219
https://access.redhat.com/security/cve/CVE-2017-7300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7300
https://nvd.nist.gov/vuln/detail/CVE-2017-7300
https://sourceware.org/bugzilla/show_bug.cgi?id=20909
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-7300
|
| binutils |
CVE-2017-7301 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/97218
https://access.redhat.com/security/cve/CVE-2017-7301
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7301
https://nvd.nist.gov/vuln/detail/CVE-2017-7301
https://sourceware.org/bugzilla/show_bug.cgi?id=20924
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-7301
|
| binutils |
CVE-2017-7302 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/97216
https://access.redhat.com/security/cve/CVE-2017-7302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7302
https://nvd.nist.gov/vuln/detail/CVE-2017-7302
https://sourceware.org/bugzilla/show_bug.cgi?id=20921
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-7302
|
| binutils |
CVE-2017-7303 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/97213
https://access.redhat.com/security/cve/CVE-2017-7303
https://nvd.nist.gov/vuln/detail/CVE-2017-7303
https://sourceware.org/bugzilla/show_bug.cgi?id=20922
https://www.cve.org/CVERecord?id=CVE-2017-7303
|
| binutils |
CVE-2017-7304 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/97215
https://access.redhat.com/security/cve/CVE-2017-7304
https://nvd.nist.gov/vuln/detail/CVE-2017-7304
https://sourceware.org/bugzilla/show_bug.cgi?id=20931
https://www.cve.org/CVERecord?id=CVE-2017-7304
|
| binutils |
CVE-2017-7614 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-7614
https://blogs.gentoo.org/ago/2017/04/05/binutils-two-null-pointer-dereference-in-elflink-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7614
https://nvd.nist.gov/vuln/detail/CVE-2017-7614
https://security.gentoo.org/glsa/201709-02
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-7614
|
| binutils |
CVE-2017-8392 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-8392
https://nvd.nist.gov/vuln/detail/CVE-2017-8392
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21409
https://www.cve.org/CVERecord?id=CVE-2017-8392
|
| binutils |
CVE-2017-8393 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-8393
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8393
https://nvd.nist.gov/vuln/detail/CVE-2017-8393
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21412
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-8393
|
| binutils |
CVE-2017-8394 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-8394
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8394
https://nvd.nist.gov/vuln/detail/CVE-2017-8394
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21414
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-8394
|
| binutils |
CVE-2017-8395 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-8395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8395
https://nvd.nist.gov/vuln/detail/CVE-2017-8395
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21431
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-8395
|
| binutils |
CVE-2017-8396 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-8396
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8396
https://nvd.nist.gov/vuln/detail/CVE-2017-8396
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21432
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-8396
|
| binutils |
CVE-2017-8397 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-8397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8397
https://nvd.nist.gov/vuln/detail/CVE-2017-8397
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21434
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-8397
|
| binutils |
CVE-2017-8398 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-8398
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8398
https://nvd.nist.gov/vuln/detail/CVE-2017-8398
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21438
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-8398
|
| binutils |
CVE-2017-8421 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-8421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8421
https://nvd.nist.gov/vuln/detail/CVE-2017-8421
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21440
https://ubuntu.com/security/notices/USN-4336-2
https://ubuntu.com/security/notices/USN-6413-1
https://www.cve.org/CVERecord?id=CVE-2017-8421
|
| binutils |
CVE-2017-9038 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/98589
https://access.redhat.com/security/cve/CVE-2017-9038
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038
https://nvd.nist.gov/vuln/detail/CVE-2017-9038
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=f32ba72991d2406b21ab17edc234a2f3fa7fb23d
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9038
|
| binutils |
CVE-2017-9039 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/98580
https://access.redhat.com/security/cve/CVE-2017-9039
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039
https://nvd.nist.gov/vuln/detail/CVE-2017-9039
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=82156ab704b08b124d319c0decdbd48b3ca2dac5
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9039
|
| binutils |
CVE-2017-9040 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/98579
https://access.redhat.com/security/cve/CVE-2017-9040
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040
https://nvd.nist.gov/vuln/detail/CVE-2017-9040
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9040
|
| binutils |
CVE-2017-9041 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/98598
https://access.redhat.com/security/cve/CVE-2017-9041
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9041
https://nvd.nist.gov/vuln/detail/CVE-2017-9041
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=75ec1fdbb797a389e4fe4aaf2e15358a070dcc19
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c4ab9505b53cdc899506ed421fddb7e1f8faf7a3
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9041
|
| binutils |
CVE-2017-9042 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2017-9042
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042
https://nvd.nist.gov/vuln/detail/CVE-2017-9042
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9042
|
| binutils |
CVE-2017-9043 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/98591
https://access.redhat.com/security/cve/CVE-2017-9043
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://nvd.nist.gov/vuln/detail/CVE-2017-9043
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=ddef72cdc10d82ba011a7ff81cafbbd3466acf54
https://www.cve.org/CVERecord?id=CVE-2017-9043
|
| binutils |
CVE-2017-9044 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/98587
https://access.redhat.com/security/cve/CVE-2017-9044
https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9044
https://nvd.nist.gov/vuln/detail/CVE-2017-9044
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9044
|
| binutils |
CVE-2017-9742 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99105
https://access.redhat.com/security/cve/CVE-2017-9742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9742
https://nvd.nist.gov/vuln/detail/CVE-2017-9742
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21576
https://ubuntu.com/security/notices/USN-4336-2
https://ubuntu.com/security/notices/USN-4336-3
https://www.cve.org/CVERecord?id=CVE-2017-9742
https://www.exploit-db.com/exploits/42203/
|
| binutils |
CVE-2017-9743 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99106
https://access.redhat.com/security/cve/CVE-2017-9743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9743
https://nvd.nist.gov/vuln/detail/CVE-2017-9743
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21577
https://www.cve.org/CVERecord?id=CVE-2017-9743
|
| binutils |
CVE-2017-9744 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99108
https://access.redhat.com/security/cve/CVE-2017-9744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9744
https://nvd.nist.gov/vuln/detail/CVE-2017-9744
https://sourceware.org/bugzilla/show_bug.cgi?id=21578
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9744
|
| binutils |
CVE-2017-9745 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99109
https://access.redhat.com/security/cve/CVE-2017-9745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9745
https://nvd.nist.gov/vuln/detail/CVE-2017-9745
https://sourceware.org/bugzilla/show_bug.cgi?id=21579
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9745
|
| binutils |
CVE-2017-9746 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99117
https://access.redhat.com/security/cve/CVE-2017-9746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9746
https://nvd.nist.gov/vuln/detail/CVE-2017-9746
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21580
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9746
https://www.exploit-db.com/exploits/42199/
|
| binutils |
CVE-2017-9747 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99114
https://access.redhat.com/security/cve/CVE-2017-9747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9747
https://nvd.nist.gov/vuln/detail/CVE-2017-9747
https://sourceware.org/bugzilla/show_bug.cgi?id=21581
https://ubuntu.com/security/notices/USN-4336-2
https://ubuntu.com/security/notices/USN-4336-3
https://www.cve.org/CVERecord?id=CVE-2017-9747
https://www.exploit-db.com/exploits/42200/
|
| binutils |
CVE-2017-9748 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99110
https://access.redhat.com/security/cve/CVE-2017-9748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9748
https://nvd.nist.gov/vuln/detail/CVE-2017-9748
https://sourceware.org/bugzilla/show_bug.cgi?id=21582
https://ubuntu.com/security/notices/USN-4336-2
https://ubuntu.com/security/notices/USN-4336-3
https://www.cve.org/CVERecord?id=CVE-2017-9748
https://www.exploit-db.com/exploits/42202/
|
| binutils |
CVE-2017-9749 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99113
https://access.redhat.com/security/cve/CVE-2017-9749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9749
https://nvd.nist.gov/vuln/detail/CVE-2017-9749
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21586
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9749
https://www.exploit-db.com/exploits/42201/
|
| binutils |
CVE-2017-9750 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99118
https://access.redhat.com/security/cve/CVE-2017-9750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9750
https://nvd.nist.gov/vuln/detail/CVE-2017-9750
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21587
https://ubuntu.com/security/notices/USN-4336-2
https://ubuntu.com/security/notices/USN-4336-3
https://www.cve.org/CVERecord?id=CVE-2017-9750
https://www.exploit-db.com/exploits/42198/
|
| binutils |
CVE-2017-9751 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99111
https://access.redhat.com/security/cve/CVE-2017-9751
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9751
https://nvd.nist.gov/vuln/detail/CVE-2017-9751
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21588
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9751
|
| binutils |
CVE-2017-9752 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99122
https://access.redhat.com/security/cve/CVE-2017-9752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9752
https://nvd.nist.gov/vuln/detail/CVE-2017-9752
https://sourceware.org/bugzilla/show_bug.cgi?id=21589
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9752
|
| binutils |
CVE-2017-9753 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99116
https://access.redhat.com/security/cve/CVE-2017-9753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9753
https://nvd.nist.gov/vuln/detail/CVE-2017-9753
https://sourceware.org/bugzilla/show_bug.cgi?id=21591
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9753
|
| binutils |
CVE-2017-9754 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99125
https://access.redhat.com/security/cve/CVE-2017-9754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9754
https://nvd.nist.gov/vuln/detail/CVE-2017-9754
https://sourceware.org/bugzilla/show_bug.cgi?id=21591
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9754
|
| binutils |
CVE-2017-9755 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99124
https://access.redhat.com/security/cve/CVE-2017-9755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9755
https://nvd.nist.gov/vuln/detail/CVE-2017-9755
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21594
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9755
|
| binutils |
CVE-2017-9756 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99103
https://access.redhat.com/security/cve/CVE-2017-9756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9756
https://nvd.nist.gov/vuln/detail/CVE-2017-9756
https://security.gentoo.org/glsa/201801-01
https://sourceware.org/bugzilla/show_bug.cgi?id=21595
https://ubuntu.com/security/notices/USN-4336-2
https://ubuntu.com/security/notices/USN-4336-3
https://www.cve.org/CVERecord?id=CVE-2017-9756
https://www.exploit-db.com/exploits/42204/
|
| binutils |
CVE-2017-9954 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99307
https://access.redhat.com/security/cve/CVE-2017-9954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9954
https://nvd.nist.gov/vuln/detail/CVE-2017-9954
https://security.gentoo.org/glsa/201709-02
https://sourceware.org/bugzilla/show_bug.cgi?id=21670
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2017-9954
|
| binutils |
CVE-2017-9955 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/99573
https://access.redhat.com/security/cve/CVE-2017-9955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9955
https://nvd.nist.gov/vuln/detail/CVE-2017-9955
https://sourceware.org/bugzilla/show_bug.cgi?id=21665
https://www.cve.org/CVERecord?id=CVE-2017-9955
|
| binutils |
CVE-2018-12698 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/104539
https://access.redhat.com/security/cve/CVE-2018-12698
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://nvd.nist.gov/vuln/detail/CVE-2018-12698
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-12698
|
| binutils |
CVE-2018-12699 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/104540
https://access.redhat.com/security/cve/CVE-2018-12699
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454
https://nvd.nist.gov/vuln/detail/CVE-2018-12699
https://security.gentoo.org/glsa/201908-01
https://sourceware.org/bugzilla/show_bug.cgi?id=23057
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-12699
|
| binutils |
CVE-2018-12700 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2018-12700
https://nvd.nist.gov/vuln/detail/CVE-2018-12700
https://www.cve.org/CVERecord?id=CVE-2018-12700
|
| binutils |
CVE-2018-12934 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2018-12934
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453
https://nvd.nist.gov/vuln/detail/CVE-2018-12934
https://sourceware.org/bugzilla/show_bug.cgi?id=23059
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-12934
|
| binutils |
CVE-2018-17360 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/security/cve/CVE-2018-17360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360
https://nvd.nist.gov/vuln/detail/CVE-2018-17360
https://sourceware.org/bugzilla/show_bug.cgi?id=23685
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-17360
|
| binutils |
CVE-2018-17794 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2018-17794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350
https://nvd.nist.gov/vuln/detail/CVE-2018-17794
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-17794
|
| binutils |
CVE-2018-17985 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
https://access.redhat.com/security/cve/CVE-2018-17985
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335
https://nvd.nist.gov/vuln/detail/CVE-2018-17985
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-17985
|
| binutils |
CVE-2018-18483 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105689
https://access.redhat.com/security/cve/CVE-2018-18483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602
https://nvd.nist.gov/vuln/detail/CVE-2018-18483
https://sourceware.org/bugzilla/show_bug.cgi?id=23767
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-18483
|
| binutils |
CVE-2018-18484 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105693
https://access.redhat.com/security/cve/CVE-2018-18484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636
https://nvd.nist.gov/vuln/detail/CVE-2018-18484
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-18484
|
| binutils |
CVE-2018-18605 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://access.redhat.com/security/cve/CVE-2018-18605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605
https://nvd.nist.gov/vuln/detail/CVE-2018-18605
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23804
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=ab419ddbb2cdd17ca83618990f2cacf904ce1d61
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-18605
|
| binutils |
CVE-2018-18606 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://access.redhat.com/security/cve/CVE-2018-18606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606
https://nvd.nist.gov/vuln/detail/CVE-2018-18606
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23806
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=45a0eaf77022963d639d6d19871dbab7b79703fc
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-18606
|
| binutils |
CVE-2018-18607 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/105754
https://access.redhat.com/security/cve/CVE-2018-18607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607
https://nvd.nist.gov/vuln/detail/CVE-2018-18607
https://security.netapp.com/advisory/ntap-20190307-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=23805
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=102def4da826b3d9e169741421e5e67e8731909a
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-18607
|
| binutils |
CVE-2018-18700 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2018-18700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681
https://nvd.nist.gov/vuln/detail/CVE-2018-18700
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-18700
|
| binutils |
CVE-2018-18701 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2018-18701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675
https://nvd.nist.gov/vuln/detail/CVE-2018-18701
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-18701
|
| binutils |
CVE-2018-19932 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/106144
https://access.redhat.com/security/cve/CVE-2018-19932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932
https://nvd.nist.gov/vuln/detail/CVE-2018-19932
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23932
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=beab453223769279cc1cef68a1622ab8978641f7
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-19932
|
| binutils |
CVE-2018-20002 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/106142
https://access.redhat.com/security/cve/CVE-2018-20002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002
https://nvd.nist.gov/vuln/detail/CVE-2018-20002
https://security.gentoo.org/glsa/201908-01
https://security.netapp.com/advisory/ntap-20190221-0004/
https://sourceware.org/bugzilla/show_bug.cgi?id=23952
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9
https://support.f5.com/csp/article/K62602089
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2018-20002
|
| binutils |
CVE-2018-20657 |
LOW |
2.27-44.base.el7_9.1 |
|
http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20657
https://support.f5.com/csp/article/K62602089
https://www.cve.org/CVERecord?id=CVE-2018-20657
|
| binutils |
CVE-2018-6323 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/102821
https://access.redhat.com/security/cve/CVE-2018-6323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6323
https://nvd.nist.gov/vuln/detail/CVE-2018-6323
https://sourceware.org/bugzilla/show_bug.cgi?id=22746
https://ubuntu.com/security/notices/USN-4336-2
https://ubuntu.com/security/notices/USN-4336-3
https://www.cve.org/CVERecord?id=CVE-2018-6323
https://www.exploit-db.com/exploits/44035/
|
| binutils |
CVE-2018-6759 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/103030
https://access.redhat.com/security/cve/CVE-2018-6759
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6759
https://nvd.nist.gov/vuln/detail/CVE-2018-6759
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22794
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2018-6759
|
| binutils |
CVE-2018-6872 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://www.securityfocus.com/bid/103103
https://access.redhat.com/security/cve/CVE-2018-6872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872
https://nvd.nist.gov/vuln/detail/CVE-2018-6872
https://security.gentoo.org/glsa/201811-17
https://sourceware.org/bugzilla/show_bug.cgi?id=22788
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Ba=commit%3Bh=ef135d4314fd4c2d7da66b9d7b59af4a85b0f7e6
https://www.cve.org/CVERecord?id=CVE-2018-6872
|
| binutils |
CVE-2019-1010204 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2019-1010204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204
https://linux.oracle.com/cve/CVE-2019-1010204.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://nvd.nist.gov/vuln/detail/CVE-2019-1010204
https://security.netapp.com/advisory/ntap-20190822-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=23765
https://support.f5.com/csp/article/K05032915?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-5349-1
https://www.cve.org/CVERecord?id=CVE-2019-1010204
|
| binutils |
CVE-2019-12972 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/108903
https://access.redhat.com/security/cve/CVE-2019-12972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972
https://nvd.nist.gov/vuln/detail/CVE-2019-12972
https://security.gentoo.org/glsa/202007-39
https://sourceware.org/bugzilla/show_bug.cgi?id=24689
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=890f750a3b053532a4b839a2dd6243076de12031
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-12972
|
| binutils |
CVE-2019-14250 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-14250
|
| binutils |
CVE-2019-17450 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-17450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450
https://linux.oracle.com/cve/CVE-2019-17450.html
https://linux.oracle.com/errata/ELSA-2020-4465.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17450
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25078
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-17450
|
| binutils |
CVE-2019-17451 |
LOW |
2.27-44.base.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
https://access.redhat.com/security/cve/CVE-2019-17451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451
https://linux.oracle.com/cve/CVE-2019-17451.html
https://linux.oracle.com/errata/ELSA-2020-1797.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17451
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20191024-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=25070
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-17451
|
| binutils |
CVE-2020-16591 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-16591
https://nvd.nist.gov/vuln/detail/CVE-2020-16591
https://security.netapp.com/advisory/ntap-20210115-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25822
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=001890e1f9269697f7e0212430a51479271bdab2
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
https://www.cve.org/CVERecord?id=CVE-2020-16591
|
| binutils |
CVE-2020-16593 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-16593
https://nvd.nist.gov/vuln/detail/CVE-2020-16593
https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25827
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=aec72fda3b320c36eb99fc1c4cf95b10fc026729
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
https://www.cve.org/CVERecord?id=CVE-2020-16593
|
| binutils |
CVE-2020-16598 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-16598
https://nvd.nist.gov/vuln/detail/CVE-2020-16598
https://sourceware.org/bugzilla/show_bug.cgi?id=25840
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ca3f923f82a079dcf441419f4a50a50f8b4b33c2
https://www.cve.org/CVERecord?id=CVE-2020-16598
|
| binutils |
CVE-2020-16599 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-16599
https://nvd.nist.gov/vuln/detail/CVE-2020-16599
https://security.netapp.com/advisory/ntap-20210122-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=25842
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
https://www.cve.org/CVERecord?id=CVE-2020-16599
|
| binutils |
CVE-2020-35448 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-35448
https://linux.oracle.com/cve/CVE-2020-35448.html
https://linux.oracle.com/errata/ELSA-2021-4364.html
https://nvd.nist.gov/vuln/detail/CVE-2020-35448
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20210129-0008/
https://sourceware.org/bugzilla/show_bug.cgi?id=26574
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=8642dafaef21aa6747cec01df1977e9c52eb4679
https://www.cve.org/CVERecord?id=CVE-2020-35448
|
| binutils |
CVE-2020-35493 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-35493
https://bugzilla.redhat.com/show_bug.cgi?id=1911437
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35493
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20210212-0007/
https://www.cve.org/CVERecord?id=CVE-2020-35493
|
| binutils |
CVE-2020-35494 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-35494
https://bugzilla.redhat.com/show_bug.cgi?id=1911439
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35494
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20210212-0007/
https://www.cve.org/CVERecord?id=CVE-2020-35494
|
| binutils |
CVE-2020-35495 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-35495
https://bugzilla.redhat.com/show_bug.cgi?id=1911441
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35495
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20210212-0007/
https://www.cve.org/CVERecord?id=CVE-2020-35495
|
| binutils |
CVE-2020-35496 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-35496
https://bugzilla.redhat.com/show_bug.cgi?id=1911444
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/
https://nvd.nist.gov/vuln/detail/CVE-2020-35496
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20210212-0007/
https://www.cve.org/CVERecord?id=CVE-2020-35496
|
| binutils |
CVE-2020-35507 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-35507
https://bugzilla.redhat.com/show_bug.cgi?id=1911691
https://nvd.nist.gov/vuln/detail/CVE-2020-35507
https://security.gentoo.org/glsa/202107-24
https://security.netapp.com/advisory/ntap-20210212-0007/
https://www.cve.org/CVERecord?id=CVE-2020-35507
|
| binutils |
CVE-2021-3826 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/errata/RHSA-2023:6372
https://access.redhat.com/security/cve/CVE-2021-3826
https://bugzilla.redhat.com/2122627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
https://errata.almalinux.org/9/ALSA-2023-6372.html
https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987
https://linux.oracle.com/cve/CVE-2021-3826.html
https://linux.oracle.com/errata/ELSA-2023-6372.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2021-3826
https://www.cve.org/CVERecord?id=CVE-2021-3826
|
| binutils |
CVE-2022-38533 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2022-38533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38533
https://github.com/bminor/binutils-gdb/commit/45d92439aebd0386ef8af76e1796d08cfe457e1d
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
https://nvd.nist.gov/vuln/detail/CVE-2022-38533
https://security.gentoo.org/glsa/202309-15
https://security.netapp.com/advisory/ntap-20221104-0007/
https://sourceware.org/bugzilla/show_bug.cgi?id=29482
https://sourceware.org/bugzilla/show_bug.cgi?id=29482#c2
https://sourceware.org/bugzilla/show_bug.cgi?id=29495
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=45d92439aebd0386ef8af76e1796d08cfe457e1d
https://ubuntu.com/security/notices/USN-5762-1
https://ubuntu.com/security/notices/USN-6544-1
https://www.cve.org/CVERecord?id=CVE-2022-38533
|
| binutils |
CVE-2022-44840 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2022-44840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44840
https://nvd.nist.gov/vuln/detail/CVE-2022-44840
https://sourceware.org/bugzilla/show_bug.cgi?id=29732
https://ubuntu.com/security/notices/USN-6381-1
https://ubuntu.com/security/notices/USN-6581-1
https://www.cve.org/CVERecord?id=CVE-2022-44840
|
| binutils |
CVE-2022-47007 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2022-47007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47007
https://nvd.nist.gov/vuln/detail/CVE-2022-47007
https://sourceware.org/bugzilla/show_bug.cgi?id=29254
https://ubuntu.com/security/notices/USN-6413-1
https://ubuntu.com/security/notices/USN-6581-1
https://www.cve.org/CVERecord?id=CVE-2022-47007
|
| binutils |
CVE-2022-47008 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2022-47008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47008
https://nvd.nist.gov/vuln/detail/CVE-2022-47008
https://sourceware.org/bugzilla/show_bug.cgi?id=29255%20
https://ubuntu.com/security/notices/USN-6413-1
https://ubuntu.com/security/notices/USN-6581-1
https://www.cve.org/CVERecord?id=CVE-2022-47008
|
| binutils |
CVE-2022-47010 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2022-47010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47010
https://nvd.nist.gov/vuln/detail/CVE-2022-47010
https://sourceware.org/bugzilla/show_bug.cgi?id=29262
https://ubuntu.com/security/notices/USN-6413-1
https://ubuntu.com/security/notices/USN-6581-1
https://www.cve.org/CVERecord?id=CVE-2022-47010
|
| binutils |
CVE-2022-47011 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2022-47011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47011
https://nvd.nist.gov/vuln/detail/CVE-2022-47011
https://sourceware.org/bugzilla/show_bug.cgi?id=29261
https://ubuntu.com/security/notices/USN-6413-1
https://ubuntu.com/security/notices/USN-6581-1
https://www.cve.org/CVERecord?id=CVE-2022-47011
|
| binutils |
CVE-2023-1972 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2023-1972
https://bugzilla.redhat.com/show_bug.cgi?id=2185646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1972
https://nvd.nist.gov/vuln/detail/CVE-2023-1972
https://security.gentoo.org/glsa/202309-15
https://sourceware.org/bugzilla/show_bug.cgi?id=30285
https://sourceware.org/git/?p=binutils-gdb.git;a=blobdiff;f=bfd/elf.c;h=185028cbd97ae0901c4276c8a4787b12bb75875a;hp=027d01437352555bc4ac0717cb0486c751a7775d;hb=c22d38baefc5a7a1e1f5cdc9dbb556b1f0ec5c57;hpb=f2f9bde5cde7ff34ed0a4c4682a211d402aa1086
https://ubuntu.com/security/notices/USN-6101-1
https://www.cve.org/CVERecord?id=CVE-2023-1972
|
| binutils |
CVE-2023-25584 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2023-25584
https://bugzilla.redhat.com/show_bug.cgi?id=2167467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25584
https://nvd.nist.gov/vuln/detail/CVE-2023-25584
https://security.netapp.com/advisory/ntap-20231103-0002/
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44
https://ubuntu.com/security/notices/USN-6101-1
https://www.cve.org/CVERecord?id=CVE-2023-25584
|
| binutils |
CVE-2023-25585 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2023-25585
https://bugzilla.redhat.com/show_bug.cgi?id=2167498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25585
https://nvd.nist.gov/vuln/detail/CVE-2023-25585
https://security.netapp.com/advisory/ntap-20231103-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=29892
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7
https://ubuntu.com/security/notices/USN-6101-1
https://www.cve.org/CVERecord?id=CVE-2023-25585
|
| binutils |
CVE-2023-25588 |
LOW |
2.27-44.base.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2023-25588
https://bugzilla.redhat.com/show_bug.cgi?id=2167505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25588
https://nvd.nist.gov/vuln/detail/CVE-2023-25588
https://security.netapp.com/advisory/ntap-20231103-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=29677
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1
https://ubuntu.com/security/notices/USN-6101-1
https://www.cve.org/CVERecord?id=CVE-2023-25588
|
| bison |
CVE-2020-14150 |
MEDIUM |
3.0.4-2.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-14150
https://bugs.gentoo.org/717936
https://lists.gnu.org/archive/html/info-gnu/2020-04/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14150
https://www.cve.org/CVERecord?id=CVE-2020-14150
|
| bison |
CVE-2020-24979 |
MEDIUM |
3.0.4-2.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-24979
https://nvd.nist.gov/vuln/detail/CVE-2020-24979
https://www.cve.org/CVERecord?id=CVE-2020-24979
|
| bzip2 |
CVE-2016-3189 |
LOW |
1.0.6-13.el7 |
|
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
http://www.openwall.com/lists/oss-security/2016/06/20/1
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91297
http://www.securitytracker.com/id/1036132
https://access.redhat.com/security/cve/CVE-2016-3189
https://bugzilla.redhat.com/show_bug.cgi?id=1319648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189
https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e%40%3Cjira.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
https://marc.info/?l=oss-security&m=146642106322396&w=2
https://nvd.nist.gov/vuln/detail/CVE-2016-3189
https://seclists.org/bugtraq/2019/Aug/4
https://seclists.org/bugtraq/2019/Jul/22
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
https://security.gentoo.org/glsa/201708-08
https://ubuntu.com/security/notices/USN-4038-1
https://ubuntu.com/security/notices/USN-4038-2
https://usn.ubuntu.com/4038-1/
https://usn.ubuntu.com/4038-2/
https://www.cve.org/CVERecord?id=CVE-2016-3189
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| bzip2 |
CVE-2019-12900 |
LOW |
1.0.6-13.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
https://access.redhat.com/security/cve/CVE-2019-12900
https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2019-12900
https://seclists.org/bugtraq/2019/Aug/4
https://seclists.org/bugtraq/2019/Jul/22
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
https://support.f5.com/csp/article/K68713584?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4038-1
https://ubuntu.com/security/notices/USN-4038-2
https://ubuntu.com/security/notices/USN-4038-3
https://ubuntu.com/security/notices/USN-4038-4
https://ubuntu.com/security/notices/USN-4146-1
https://ubuntu.com/security/notices/USN-4146-2
https://usn.ubuntu.com/4038-1/
https://usn.ubuntu.com/4038-2/
https://usn.ubuntu.com/4146-1/
https://usn.ubuntu.com/4146-2/
https://www.cve.org/CVERecord?id=CVE-2019-12900
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| bzip2-libs |
CVE-2016-3189 |
LOW |
1.0.6-13.el7 |
|
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
http://www.openwall.com/lists/oss-security/2016/06/20/1
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91297
http://www.securitytracker.com/id/1036132
https://access.redhat.com/security/cve/CVE-2016-3189
https://bugzilla.redhat.com/show_bug.cgi?id=1319648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189
https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e%40%3Cjira.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
https://marc.info/?l=oss-security&m=146642106322396&w=2
https://nvd.nist.gov/vuln/detail/CVE-2016-3189
https://seclists.org/bugtraq/2019/Aug/4
https://seclists.org/bugtraq/2019/Jul/22
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
https://security.gentoo.org/glsa/201708-08
https://ubuntu.com/security/notices/USN-4038-1
https://ubuntu.com/security/notices/USN-4038-2
https://usn.ubuntu.com/4038-1/
https://usn.ubuntu.com/4038-2/
https://www.cve.org/CVERecord?id=CVE-2016-3189
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| bzip2-libs |
CVE-2019-12900 |
LOW |
1.0.6-13.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html
http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
https://access.redhat.com/security/cve/CVE-2019-12900
https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2019-12900
https://seclists.org/bugtraq/2019/Aug/4
https://seclists.org/bugtraq/2019/Jul/22
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
https://support.f5.com/csp/article/K68713584?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4038-1
https://ubuntu.com/security/notices/USN-4038-2
https://ubuntu.com/security/notices/USN-4038-3
https://ubuntu.com/security/notices/USN-4038-4
https://ubuntu.com/security/notices/USN-4146-1
https://ubuntu.com/security/notices/USN-4146-2
https://usn.ubuntu.com/4038-1/
https://usn.ubuntu.com/4038-2/
https://usn.ubuntu.com/4146-1/
https://usn.ubuntu.com/4146-2/
https://www.cve.org/CVERecord?id=CVE-2019-12900
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| ca-certificates |
CVE-2023-37920 |
LOW |
2023.2.60_v7.0.306-72.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:7753
https://access.redhat.com/security/cve/CVE-2023-37920
https://bugzilla.redhat.com/2226586
https://bugzilla.redhat.com/2242493
https://errata.almalinux.org/9/ALSA-2023-7753.html
https://github.com/certifi/python-certifi
https://github.com/certifi/python-certifi/commit/8fb96ed81f71e7097ed11bc4d9b19afd7ea5c909
https://github.com/certifi/python-certifi/security/advisories/GHSA-xqr8-7jwr-rhp7
https://github.com/pypa/advisory-database/tree/main/vulns/certifi/PYSEC-2023-135.yaml
https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/C-HrP1SEq1A
https://linux.oracle.com/cve/CVE-2023-37920.html
https://linux.oracle.com/errata/ELSA-2024-0133.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EX6NG7WUFNUKGFHLM35KHHU3GAKXRTG/
https://nvd.nist.gov/vuln/detail/CVE-2023-37920
https://www.cve.org/CVERecord?id=CVE-2023-37920
|
| coreutils |
CVE-2016-2781 |
MEDIUM |
8.22-24.el7_9.2 |
|
http://seclists.org/oss-sec/2016/q1/452
http://www.openwall.com/lists/oss-security/2016/02/28/2
http://www.openwall.com/lists/oss-security/2016/02/28/3
https://access.redhat.com/security/cve/CVE-2016-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lore.kernel.org/patchwork/patch/793178/
https://nvd.nist.gov/vuln/detail/CVE-2016-2781
https://www.cve.org/CVERecord?id=CVE-2016-2781
|
| coreutils |
CVE-2017-18018 |
MEDIUM |
8.22-24.el7_9.2 |
|
http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html
https://access.redhat.com/security/cve/CVE-2017-18018
https://nvd.nist.gov/vuln/detail/CVE-2017-18018
https://www.cve.org/CVERecord?id=CVE-2017-18018
|
| coreutils |
CVE-2014-9471 |
LOW |
8.22-24.el7_9.2 |
|
http://advisories.mageia.org/MGASA-2015-0029.html
http://debbugs.gnu.org/cgi/bugreport.cgi?bug=16872
http://debbugs.gnu.org/cgi/bugreport.cgi?msg=11;filename=date-tz-crash.patch;att=1;bug=16872
http://debbugs.gnu.org/cgi/bugreport.cgi?msg=19;filename=coreutils-date-crash.patch;att=1;bug=16872
http://secunia.com/advisories/62226
http://ubuntu.com/usn/usn-2473-1
http://www.mandriva.com/security/advisories?name=MDVSA-2015:179
http://www.openwall.com/lists/oss-security/2014/11/25/1
http://www.openwall.com/lists/oss-security/2014/11/25/4
http://www.openwall.com/lists/oss-security/2015/01/03/11
https://access.redhat.com/security/cve/CVE-2014-9471
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9471
https://nvd.nist.gov/vuln/detail/CVE-2014-9471
https://security.gentoo.org/glsa/201612-22
https://ubuntu.com/security/notices/USN-2473-1
https://www.cve.org/CVERecord?id=CVE-2014-9471
|
| coreutils |
CVE-2015-4041 |
LOW |
8.22-24.el7_9.2 |
|
http://openwall.com/lists/oss-security/2015/05/15/1
https://access.redhat.com/security/cve/CVE-2015-4041
https://bugzilla.suse.com/show_bug.cgi?id=928749
https://github.com/pixelb/coreutils/commit/bea5e36cc876ed627bb5e0eca36fdfaa6465e940
https://nvd.nist.gov/vuln/detail/CVE-2015-4041
https://www.cve.org/CVERecord?id=CVE-2015-4041
|
| coreutils |
CVE-2015-4042 |
LOW |
8.22-24.el7_9.2 |
|
http://openwall.com/lists/oss-security/2015/05/15/1
https://access.redhat.com/security/cve/CVE-2015-4042
https://github.com/pixelb/coreutils/commit/bea5e36cc876ed627bb5e0eca36fdfaa6465e940
https://nvd.nist.gov/vuln/detail/CVE-2015-4042
https://www.cve.org/CVERecord?id=CVE-2015-4042
|
| cpio |
CVE-2021-38185 |
MEDIUM |
2.11-28.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-38185
https://bugzilla.redhat.com/show_bug.cgi?id=1991731
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185
https://errata.almalinux.org/8/ALSA-2022-1991.html
https://errata.rockylinux.org/RLSA-2022:1991
https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b
https://github.com/fangqyi/cpiopwn
https://linux.oracle.com/cve/CVE-2021-38185.html
https://linux.oracle.com/errata/ELSA-2022-1991.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html
https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html
https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html
https://nvd.nist.gov/vuln/detail/CVE-2021-38185
https://ubuntu.com/security/notices/USN-5064-1
https://ubuntu.com/security/notices/USN-5064-2
https://ubuntu.com/security/notices/USN-5064-3
https://www.cve.org/CVERecord?id=CVE-2021-38185
|
| cpio |
CVE-2023-7207 |
MEDIUM |
2.11-28.el7 |
|
http://www.openwall.com/lists/oss-security/2024/01/05/1
https://access.redhat.com/security/cve/CVE-2023-7207
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207
https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628
https://nvd.nist.gov/vuln/detail/CVE-2023-7207
https://www.cve.org/CVERecord?id=CVE-2023-7207
https://www.openwall.com/lists/oss-security/2023/12/21/8
|
| cpio |
CVE-2023-7216 |
MEDIUM |
2.11-28.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-7216
https://bugzilla.redhat.com/show_bug.cgi?id=2249901
https://nvd.nist.gov/vuln/detail/CVE-2023-7216
https://www.cve.org/CVERecord?id=CVE-2023-7216
|
| cpio |
CVE-2015-1197 |
LOW |
2.11-28.el7 |
|
http://advisories.mageia.org/MGASA-2015-0080.html
http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html
http://www.mandriva.com/security/advisories?name=MDVSA-2015:066
http://www.openwall.com/lists/oss-security/2015/01/07/5
http://www.openwall.com/lists/oss-security/2015/01/18/7
http://www.openwall.com/lists/oss-security/2023/12/21/8
http://www.openwall.com/lists/oss-security/2023/12/27/1
http://www.securityfocus.com/bid/71914
http://www.ubuntu.com/usn/USN-2906-1
https://access.redhat.com/security/cve/CVE-2015-1197
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1197
https://lists.gnu.org/archive/html/bug-cpio/2015-01/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2015-1197
https://ubuntu.com/security/notices/USN-2906-1
https://www.cve.org/CVERecord?id=CVE-2015-1197
|
| cpio |
CVE-2016-2037 |
LOW |
2.11-28.el7 |
|
http://www.debian.org/security/2016/dsa-3483
http://www.openwall.com/lists/oss-security/2016/01/19/4
http://www.openwall.com/lists/oss-security/2016/01/22/4
http://www.securityfocus.com/bid/82293
http://www.securitytracker.com/id/1035067
http://www.ubuntu.com/usn/USN-2906-1
https://access.redhat.com/security/cve/CVE-2016-2037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037
https://nvd.nist.gov/vuln/detail/CVE-2016-2037
https://ubuntu.com/security/notices/USN-2906-1
https://www.cve.org/CVERecord?id=CVE-2016-2037
|
| cpp |
CVE-2014-5044 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
https://nvd.nist.gov/vuln/detail/CVE-2014-5044
https://www.cve.org/CVERecord?id=CVE-2014-5044
|
| cpp |
CVE-2018-20673 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20673
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
https://www.cve.org/CVERecord?id=CVE-2018-20673
|
| cpp |
CVE-2019-16276 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://nvd.nist.gov/vuln/detail/CVE-2019-16276
https://security.netapp.com/advisory/ntap-20191122-0004/
https://www.cve.org/CVERecord?id=CVE-2019-16276
|
| cpp |
CVE-2020-16845 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002
https://security.netapp.com/advisory/ntap-20200924-0002/
https://ubuntu.com/security/notices/USN-5725-1
https://ubuntu.com/security/notices/USN-5725-2
https://www.cve.org/CVERecord?id=CVE-2020-16845
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| cpp |
CVE-2020-24553 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://groups.google.com/forum/#%21topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.cve.org/CVERecord?id=CVE-2020-24553
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| cpp |
CVE-2020-28362 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
https://www.cve.org/CVERecord?id=CVE-2020-28362
|
| cpp |
CVE-2020-28366 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://go.dev/cl/269658
https://go.dev/issue/42559
https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://pkg.go.dev/vuln/GO-2022-0475
https://www.cve.org/CVERecord?id=CVE-2020-28366
|
| cpp |
CVE-2020-28367 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://go.dev/cl/267277
https://go.dev/issue/42556
https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://pkg.go.dev/vuln/GO-2022-0476
https://www.cve.org/CVERecord?id=CVE-2020-28367
|
| cpp |
CVE-2021-27918 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
https://security.gentoo.org/glsa/202208-02
https://www.cve.org/CVERecord?id=CVE-2021-27918
|
| cpp |
CVE-2021-42574 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://bugzilla.redhat.com/show_bug.cgi?id=2005819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574
https://errata.rockylinux.org/RLSA-2021:4585
https://github.com/rust-lang/rust/commit/dd61274930ec0cd17711fab52d2bc9ad3e9053de (1.56.1)
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-42574
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42574
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.openwall.com/lists/oss-security/2021/11/01/1
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.starwindsoftware.com/security/sw-20220804-0002/
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| cpp |
CVE-2021-42694 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://nvd.nist.gov/vuln/detail/CVE-2021-42694
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42694
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
|
| cpp |
CVE-2015-5276 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
https://nvd.nist.gov/vuln/detail/CVE-2015-5276
https://www.cve.org/CVERecord?id=CVE-2015-5276
|
| cpp |
CVE-2016-2226 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://nvd.nist.gov/vuln/detail/CVE-2016-2226
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-2226
https://www.exploit-db.com/exploits/42386/
|
| cpp |
CVE-2016-4487 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4487
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4487
|
| cpp |
CVE-2016-4488 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4488
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4488
|
| cpp |
CVE-2016-4489 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://nvd.nist.gov/vuln/detail/CVE-2016-4489
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4489
|
| cpp |
CVE-2016-4490 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://nvd.nist.gov/vuln/detail/CVE-2016-4490
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4490
|
| cpp |
CVE-2016-4491 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4491
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4491
|
| cpp |
CVE-2016-4492 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=03ef0c6c55ab81002abef62cec430d0496c3a01c
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4492
|
| cpp |
CVE-2016-4493 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4493
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4493
|
| cpp |
CVE-2018-20657 |
LOW |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20657
https://support.f5.com/csp/article/K62602089
https://www.cve.org/CVERecord?id=CVE-2018-20657
|
| cpp |
CVE-2019-14250 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-14250
|
| cpp |
CVE-2021-3826 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6372
https://access.redhat.com/security/cve/CVE-2021-3826
https://bugzilla.redhat.com/2122627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
https://errata.almalinux.org/9/ALSA-2023-6372.html
https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987
https://linux.oracle.com/cve/CVE-2021-3826.html
https://linux.oracle.com/errata/ELSA-2023-6372.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2021-3826
https://www.cve.org/CVERecord?id=CVE-2021-3826
|
| cpp |
CVE-2021-46195 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8415
https://access.redhat.com/security/cve/CVE-2021-46195
https://bugzilla.redhat.com/2046300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195
https://errata.almalinux.org/9/ALSA-2022-8415.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=f10bec5ffa487ad3033ed5f38cfd0fc7d696deab
https://linux.oracle.com/cve/CVE-2021-46195.html
https://linux.oracle.com/errata/ELSA-2022-8415.html
https://nvd.nist.gov/vuln/detail/CVE-2021-46195
https://www.cve.org/CVERecord?id=CVE-2021-46195
|
| cpp |
CVE-2022-27943 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-27943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
|
| cracklib |
CVE-2016-6318 |
LOW |
2.9.0-11.el7 |
|
http://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html
http://seclists.org/oss-sec/2016/q3/290
http://www.openwall.com/lists/oss-security/2016/08/16/2
http://www.securityfocus.com/bid/92478
https://access.redhat.com/security/cve/CVE-2016-6318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/05/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6318
https://security.gentoo.org/glsa/201612-25
https://www.cve.org/CVERecord?id=CVE-2016-6318
|
| cracklib-dicts |
CVE-2016-6318 |
LOW |
2.9.0-11.el7 |
|
http://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html
http://seclists.org/oss-sec/2016/q3/290
http://www.openwall.com/lists/oss-security/2016/08/16/2
http://www.securityfocus.com/bid/92478
https://access.redhat.com/security/cve/CVE-2016-6318
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/05/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6318
https://security.gentoo.org/glsa/201612-25
https://www.cve.org/CVERecord?id=CVE-2016-6318
|
| curl |
CVE-2015-3153 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://curl.haxx.se/docs/adv_20150429.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html
http://www.debian.org/security/2015/dsa-3240
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
http://www.securityfocus.com/bid/74408
http://www.securitytracker.com/id/1032233
http://www.ubuntu.com/usn/USN-2591-1
https://access.redhat.com/security/cve/CVE-2015-3153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153
https://kc.mcafee.com/corporate/index?page=content&id=SB10131
https://nvd.nist.gov/vuln/detail/CVE-2015-3153
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2591-1
https://www.cve.org/CVERecord?id=CVE-2015-3153
|
| curl |
CVE-2016-8615 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94096
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8615
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615
https://curl.haxx.se/CVE-2016-8615.patch
https://curl.haxx.se/docs/adv_20161102A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
https://linux.oracle.com/cve/CVE-2016-8615.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8615
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8615
https://www.tenable.com/security/tns-2016-21
|
| curl |
CVE-2016-8617 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94097
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8617
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617
https://curl.haxx.se/CVE-2016-8617.patch
https://curl.haxx.se/docs/adv_20161102C.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
https://linux.oracle.com/cve/CVE-2016-8617.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8617
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8617
https://www.tenable.com/security/tns-2016-21
|
| curl |
CVE-2016-8618 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94098
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8618
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618
https://curl.haxx.se/docs/adv_20161102D.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
https://linux.oracle.com/cve/CVE-2016-8618.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8618
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8618
https://www.tenable.com/security/tns-2016-21
|
| curl |
CVE-2016-8619 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94100
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8619
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619
https://curl.haxx.se/CVE-2016-8619.patch
https://curl.haxx.se/docs/adv_20161102E.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
https://linux.oracle.com/cve/CVE-2016-8619.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8619
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8619
https://www.tenable.com/security/tns-2016-21
|
| curl |
CVE-2016-8624 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94103
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8624
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624
https://curl.haxx.se/docs/adv_20161102J.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
https://linux.oracle.com/cve/CVE-2016-8624.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8624
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8624
https://www.tenable.com/security/tns-2016-21
|
| curl |
CVE-2016-8625 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.securityfocus.com/bid/94107
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8625
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625
https://curl.haxx.se/CVE-2016-8625.patch
https://curl.haxx.se/docs/adv_20161102K.html
https://linux.oracle.com/cve/CVE-2016-8625.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8625
https://security.gentoo.org/glsa/201701-47
https://www.cve.org/CVERecord?id=CVE-2016-8625
https://www.tenable.com/security/tns-2016-21
|
| curl |
CVE-2017-1000254 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/101115
http://www.securitytracker.com/id/1039509
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000254
https://curl.haxx.se/673d0cd8.patch
https://curl.haxx.se/docs/adv_20171004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-1000254
https://security.gentoo.org/glsa/201712-04
https://support.apple.com/HT208331
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
https://www.cve.org/CVERecord?id=CVE-2017-1000254
|
| curl |
CVE-2017-8817 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://security.cucumberlinux.com/security/details.php?id=162
http://www.securityfocus.com/bid/102057
http://www.securitytracker.com/id/1039897
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-8817
https://curl.haxx.se/docs/adv_2017-ae72.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
https://nvd.nist.gov/vuln/detail/CVE-2017-8817
https://security.gentoo.org/glsa/201712-04
https://ubuntu.com/security/notices/USN-3498-1
https://ubuntu.com/security/notices/USN-3498-2
https://www.cve.org/CVERecord?id=CVE-2017-8817
https://www.debian.org/security/2017/dsa-4051
|
| curl |
CVE-2020-8284 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2020-8284
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2020-8284.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
https://hackerone.com/reports/1040166
https://linux.oracle.com/cve/CVE-2020-8284.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://nvd.nist.gov/vuln/detail/CVE-2020-8284
https://security.gentoo.org/glsa/202012-14
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
https://ubuntu.com/security/notices/USN-4665-1
https://ubuntu.com/security/notices/USN-4665-2
https://www.cve.org/CVERecord?id=CVE-2020-8284
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| curl |
CVE-2020-8285 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2021/Apr/51
https://access.redhat.com/security/cve/CVE-2020-8285
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2020-8285.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
https://github.com/curl/curl/issues/6255
https://hackerone.com/reports/1045844
https://linux.oracle.com/cve/CVE-2020-8285.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://nvd.nist.gov/vuln/detail/CVE-2020-8285
https://security.gentoo.org/glsa/202012-14
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
https://ubuntu.com/security/notices/USN-4665-1
https://ubuntu.com/security/notices/USN-4665-2
https://www.cve.org/CVERecord?id=CVE-2020-8285
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| curl |
CVE-2021-22876 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2021-22876
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22876.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1101882
https://linux.oracle.com/cve/CVE-2021-22876.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-22876
https://security.gentoo.org/glsa/202105-36
https://security.netapp.com/advisory/ntap-20210521-0007/
https://ubuntu.com/security/notices/USN-4898-1
https://ubuntu.com/security/notices/USN-4903-1
https://www.cve.org/CVERecord?id=CVE-2021-22876
https://www.oracle.com//security-alerts/cpujul2021.html
|
| curl |
CVE-2021-22924 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.cve.org/CVERecord?id=CVE-2021-22924
https://www.debian.org/security/2022/dsa-5197
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| curl |
CVE-2021-22946 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.cve.org/CVERecord?id=CVE-2021-22946
https://www.debian.org/security/2022/dsa-5197
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| curl |
CVE-2021-22947 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.cve.org/CVERecord?id=CVE-2021-22947
https://www.debian.org/security/2022/dsa-5197
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| curl |
CVE-2022-27774 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/errata/RHSA-2022:5313
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json
https://access.redhat.com/security/cve/CVE-2022-27774
https://bugzilla.redhat.com/2077541
https://bugzilla.redhat.com/2077547
https://bugzilla.redhat.com/2078408
https://bugzilla.redhat.com/2082215
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://errata.almalinux.org/8/ALSA-2022-5313.html
https://hackerone.com/reports/1543773
https://linux.oracle.com/cve/CVE-2022-27774.html
https://linux.oracle.com/errata/ELSA-2022-5313.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
https://nvd.nist.gov/vuln/detail/CVE-2022-27774
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
https://www.cve.org/CVERecord?id=CVE-2022-27774
https://www.debian.org/security/2022/dsa-5197
|
| curl |
CVE-2022-27776 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/errata/RHSA-2022:5313
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json
https://access.redhat.com/security/cve/CVE-2022-27776
https://bugzilla.redhat.com/2077541
https://bugzilla.redhat.com/2077547
https://bugzilla.redhat.com/2078408
https://bugzilla.redhat.com/2082215
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://errata.almalinux.org/8/ALSA-2022-5313.html
https://hackerone.com/reports/1547048
https://linux.oracle.com/cve/CVE-2022-27776.html
https://linux.oracle.com/errata/ELSA-2022-5313.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
https://nvd.nist.gov/vuln/detail/CVE-2022-27776
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
https://www.cve.org/CVERecord?id=CVE-2022-27776
https://www.debian.org/security/2022/dsa-5197
|
| curl |
CVE-2022-27778 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2022-27778
https://curl.se/docs/CVE-2022-27778.html
https://hackerone.com/reports/1553598
https://nvd.nist.gov/vuln/detail/CVE-2022-27778
https://security.netapp.com/advisory/ntap-20220609-0009/
https://security.netapp.com/advisory/ntap-20220729-0004/
https://www.cve.org/CVERecord?id=CVE-2022-27778
https://www.oracle.com/security-alerts/cpujul2022.html
|
| curl |
CVE-2022-27779 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2022-27779
https://curl.se/docs/CVE-2022-27779.html
https://hackerone.com/reports/1553301
https://nvd.nist.gov/vuln/detail/CVE-2022-27779
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0009/
https://www.cve.org/CVERecord?id=CVE-2022-27779
|
| curl |
CVE-2022-27780 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2022-27780
https://curl.se/docs/CVE-2022-27780.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780
https://hackerone.com/reports/1553841
https://nvd.nist.gov/vuln/detail/CVE-2022-27780
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
https://www.cve.org/CVERecord?id=CVE-2022-27780
|
| curl |
CVE-2022-27782 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.openwall.com/lists/oss-security/2023/03/20/6
https://access.redhat.com/errata/RHSA-2022:5313
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json
https://access.redhat.com/security/cve/CVE-2022-27782
https://bugzilla.redhat.com/2077541
https://bugzilla.redhat.com/2077547
https://bugzilla.redhat.com/2078408
https://bugzilla.redhat.com/2082215
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://errata.almalinux.org/8/ALSA-2022-5313.html
https://hackerone.com/reports/1555796
https://linux.oracle.com/cve/CVE-2022-27782.html
https://linux.oracle.com/errata/ELSA-2022-5313.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
https://www.cve.org/CVERecord?id=CVE-2022-27782
https://www.debian.org/security/2022/dsa-5197
|
| curl |
CVE-2022-30115 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.openwall.com/lists/oss-security/2022/10/26/4
http://www.openwall.com/lists/oss-security/2022/12/21/1
https://access.redhat.com/security/cve/CVE-2022-30115
https://curl.se/docs/CVE-2022-30115.html
https://hackerone.com/reports/1557449
https://nvd.nist.gov/vuln/detail/CVE-2022-30115
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0009/
https://www.cve.org/CVERecord?id=CVE-2022-30115
|
| curl |
CVE-2022-32208 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
https://access.redhat.com/errata/RHSA-2022:6157
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json
https://access.redhat.com/security/cve/CVE-2022-32208
https://bugzilla.redhat.com/2099300
https://bugzilla.redhat.com/2099305
https://bugzilla.redhat.com/2099306
https://curl.se/docs/CVE-2022-32208.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
https://errata.almalinux.org/9/ALSA-2022-6157.html
https://hackerone.com/reports/1590071
https://linux.oracle.com/cve/CVE-2022-32208.html
https://linux.oracle.com/errata/ELSA-2022-6159.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
https://nvd.nist.gov/vuln/detail/CVE-2022-32208
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220915-0003/
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5495-1
https://ubuntu.com/security/notices/USN-5499-1
https://www.cve.org/CVERecord?id=CVE-2022-32208
https://www.debian.org/security/2022/dsa-5197
|
| curl |
CVE-2022-43551 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2022-43551
https://curl.se/docs/CVE-2022-43551.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551
https://hackerone.com/reports/1755083
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/
https://nvd.nist.gov/vuln/detail/CVE-2022-43551
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230427-0007/
https://ubuntu.com/security/notices/USN-5788-1
https://www.cve.org/CVERecord?id=CVE-2022-43551
|
| curl |
CVE-2023-27535 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/errata/RHSA-2023:2650
https://access.redhat.com/security/cve/CVE-2023-27535
https://bugzilla.redhat.com/2179073
https://bugzilla.redhat.com/show_bug.cgi?id=2179073
https://bugzilla.redhat.com/show_bug.cgi?id=2188029
https://curl.se/docs/CVE-2023-27535.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535
https://errata.almalinux.org/9/ALSA-2023-2650.html
https://errata.rockylinux.org/RLSA-2023:3106
https://hackerone.com/reports/1892780
https://linux.oracle.com/cve/CVE-2023-27535.html
https://linux.oracle.com/errata/ELSA-2023-3106.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://nvd.nist.gov/vuln/detail/CVE-2023-27535
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0010/
https://ubuntu.com/security/notices/USN-5964-1
https://ubuntu.com/security/notices/USN-5964-2
https://www.cve.org/CVERecord?id=CVE-2023-27535
|
| curl |
CVE-2023-27536 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/errata/RHSA-2023:6679
https://access.redhat.com/security/cve/CVE-2023-27536
https://bugzilla.redhat.com/2179062
https://bugzilla.redhat.com/2179069
https://bugzilla.redhat.com/2179092
https://bugzilla.redhat.com/2179103
https://bugzilla.redhat.com/show_bug.cgi?id=2179092
https://bugzilla.redhat.com/show_bug.cgi?id=2196786
https://curl.se/docs/CVE-2023-27536.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321
https://errata.almalinux.org/9/ALSA-2023-6679.html
https://errata.rockylinux.org/RLSA-2023:4523
https://hackerone.com/reports/1895135
https://linux.oracle.com/cve/CVE-2023-27536.html
https://linux.oracle.com/errata/ELSA-2023-6679.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://nvd.nist.gov/vuln/detail/CVE-2023-27536
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0010/
https://ubuntu.com/security/notices/USN-5964-1
https://ubuntu.com/security/notices/USN-5964-2
https://www.cve.org/CVERecord?id=CVE-2023-27536
|
| curl |
CVE-2023-27538 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/errata/RHSA-2023:6679
https://access.redhat.com/security/cve/CVE-2023-27538
https://bugzilla.redhat.com/2179062
https://bugzilla.redhat.com/2179069
https://bugzilla.redhat.com/2179092
https://bugzilla.redhat.com/2179103
https://curl.se/docs/CVE-2023-27538.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538
https://errata.almalinux.org/9/ALSA-2023-6679.html
https://hackerone.com/reports/1898475
https://linux.oracle.com/cve/CVE-2023-27538.html
https://linux.oracle.com/errata/ELSA-2023-6679.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://nvd.nist.gov/vuln/detail/CVE-2023-27538
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0010/
https://ubuntu.com/security/notices/USN-5964-1
https://www.cve.org/CVERecord?id=CVE-2023-27538
|
| curl |
CVE-2023-28321 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://access.redhat.com/errata/RHSA-2023:4354
https://access.redhat.com/security/cve/CVE-2023-28321
https://bugzilla.redhat.com/2196786
https://bugzilla.redhat.com/2196793
https://bugzilla.redhat.com/show_bug.cgi?id=2179092
https://bugzilla.redhat.com/show_bug.cgi?id=2196786
https://curl.se/docs/CVE-2023-28321.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321
https://errata.almalinux.org/9/ALSA-2023-4354.html
https://errata.rockylinux.org/RLSA-2023:4523
https://hackerone.com/reports/1950627
https://linux.oracle.com/cve/CVE-2023-28321.html
https://linux.oracle.com/errata/ELSA-2023-4523.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
https://nvd.nist.gov/vuln/detail/CVE-2023-28321
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230609-0009/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6237-1
https://ubuntu.com/security/notices/USN-6237-3
https://www.cve.org/CVERecord?id=CVE-2023-28321
|
| curl |
CVE-2016-0755 |
LOW |
7.29.0-59.el7_9.2 |
|
http://curl.haxx.se/docs/adv_20160127A.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
http://www.debian.org/security/2016/dsa-3455
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/82307
http://www.securitytracker.com/id/1034882
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
http://www.ubuntu.com/usn/USN-2882-1
https://access.redhat.com/security/cve/CVE-2016-0755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
https://nvd.nist.gov/vuln/detail/CVE-2016-0755
https://security.gentoo.org/glsa/201701-47
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-2882-1
https://www.cve.org/CVERecord?id=CVE-2016-0755
|
| curl |
CVE-2016-8616 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94094
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8616
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616
https://curl.haxx.se/CVE-2016-8616.patch
https://curl.haxx.se/docs/adv_20161102B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
https://linux.oracle.com/cve/CVE-2016-8616.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8616
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8616
https://www.tenable.com/security/tns-2016-21
|
| curl |
CVE-2016-8621 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94101
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8621
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621
https://curl.haxx.se/CVE-2016-8621.patch
https://curl.haxx.se/docs/adv_20161102G.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
https://linux.oracle.com/cve/CVE-2016-8621.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8621
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8621
https://www.tenable.com/security/tns-2016-21
|
| curl |
CVE-2016-8622 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94105
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8622
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622
https://curl.haxx.se/docs/adv_20161102H.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
https://linux.oracle.com/cve/CVE-2016-8622.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8622
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8622
https://www.tenable.com/security/tns-2016-21
|
| curl |
CVE-2016-8623 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94106
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623
https://curl.haxx.se/CVE-2016-8623.patch
https://curl.haxx.se/docs/adv_20161102I.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
https://linux.oracle.com/cve/CVE-2016-8623.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8623
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8623
https://www.tenable.com/security/tns-2016-21
|
| curl |
CVE-2016-9586 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/95019
http://www.securitytracker.com/id/1037515
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-9586
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
https://curl.haxx.se/docs/adv_20161221A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2016-9586
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
https://www.cve.org/CVERecord?id=CVE-2016-9586
|
| curl |
CVE-2017-1000100 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/100286
http://www.securitytracker.com/id/1039118
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000100
https://curl.haxx.se/docs/adv_20170809B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
https://nvd.nist.gov/vuln/detail/CVE-2017-1000100
https://security.gentoo.org/glsa/201709-14
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
https://www.cve.org/CVERecord?id=CVE-2017-1000100
|
| curl |
CVE-2017-7407 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-7407
https://curl.haxx.se/docs/adv_20170403.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
https://nvd.nist.gov/vuln/detail/CVE-2017-7407
https://security.gentoo.org/glsa/201709-14
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
https://www.cve.org/CVERecord?id=CVE-2017-7407
|
| curl |
CVE-2018-20483 |
LOW |
7.29.0-59.el7_9.2 |
|
http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS
http://www.securityfocus.com/bid/106358
https://access.redhat.com/errata/RHSA-2019:3701
https://access.redhat.com/security/cve/CVE-2018-20483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483
https://linux.oracle.com/cve/CVE-2018-20483.html
https://linux.oracle.com/errata/ELSA-2019-3701.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20483
https://security.gentoo.org/glsa/201903-08
https://security.netapp.com/advisory/ntap-20190321-0002/
https://twitter.com/marcan42/status/1077676739877232640
https://ubuntu.com/security/notices/USN-3943-1
https://usn.ubuntu.com/3943-1/
https://www.cve.org/CVERecord?id=CVE-2018-20483
|
| curl |
CVE-2020-8231 |
LOW |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2020-8231
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.haxx.se/docs/CVE-2020-8231.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
https://hackerone.com/reports/948876
https://linux.oracle.com/cve/CVE-2020-8231.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-8231
https://security.gentoo.org/glsa/202012-14
https://ubuntu.com/security/notices/USN-4466-1
https://ubuntu.com/security/notices/USN-4466-2
https://ubuntu.com/security/notices/USN-4665-1
https://www.cve.org/CVERecord?id=CVE-2020-8231
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| curl |
CVE-2021-22898 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://ubuntu.com/security/notices/USN-5894-1
https://www.cve.org/CVERecord?id=CVE-2021-22898
https://www.debian.org/security/2022/dsa-5197
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| curl |
CVE-2021-22925 |
LOW |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
https://access.redhat.com/security/cve/CVE-2021-22925
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22925
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://ubuntu.com/security/notices/USN-5894-1
https://www.cve.org/CVERecord?id=CVE-2021-22925
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| curl |
CVE-2022-27781 |
LOW |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
https://ubuntu.com/security/notices/USN-5499-1
https://www.cve.org/CVERecord?id=CVE-2022-27781
https://www.debian.org/security/2022/dsa-5197
|
| curl |
CVE-2022-35252 |
LOW |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2023/Jan/20
http://seclists.org/fulldisclosure/2023/Jan/21
https://access.redhat.com/errata/RHSA-2023:2478
https://access.redhat.com/security/cve/CVE-2022-35252
https://bugzilla.redhat.com/2120718
https://bugzilla.redhat.com/2152652
https://curl.se/docs/CVE-2022-35252.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252
https://errata.almalinux.org/9/ALSA-2023-2478.html
https://hackerone.com/reports/1613943
https://linux.oracle.com/cve/CVE-2022-35252.html
https://linux.oracle.com/errata/ELSA-2023-2963.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
https://nvd.nist.gov/vuln/detail/CVE-2022-35252
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220930-0005/
https://support.apple.com/kb/HT213603
https://support.apple.com/kb/HT213604
https://ubuntu.com/security/notices/USN-5587-1
https://www.cve.org/CVERecord?id=CVE-2022-35252
https://www.openwall.com/lists/oss-security/2022/08/31/2
|
| curl |
CVE-2023-27534 |
LOW |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/errata/RHSA-2023:6679
https://access.redhat.com/security/cve/CVE-2023-27534
https://bugzilla.redhat.com/2179062
https://bugzilla.redhat.com/2179069
https://bugzilla.redhat.com/2179092
https://bugzilla.redhat.com/2179103
https://curl.se/docs/CVE-2023-27534.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534
https://errata.almalinux.org/9/ALSA-2023-6679.html
https://hackerone.com/reports/1892351
https://linux.oracle.com/cve/CVE-2023-27534.html
https://linux.oracle.com/errata/ELSA-2023-6679.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://nvd.nist.gov/vuln/detail/CVE-2023-27534
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0012/
https://ubuntu.com/security/notices/USN-5964-1
https://www.cve.org/CVERecord?id=CVE-2023-27534
|
| curl |
CVE-2023-28322 |
LOW |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://access.redhat.com/errata/RHSA-2023:4354
https://access.redhat.com/security/cve/CVE-2023-28322
https://bugzilla.redhat.com/2196786
https://bugzilla.redhat.com/2196793
https://curl.se/docs/CVE-2023-28322.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322
https://errata.almalinux.org/9/ALSA-2023-4354.html
https://hackerone.com/reports/1954658
https://linux.oracle.com/cve/CVE-2023-28322.html
https://linux.oracle.com/errata/ELSA-2023-4354.html
https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
https://nvd.nist.gov/vuln/detail/CVE-2023-28322
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230609-0009/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6237-1
https://ubuntu.com/security/notices/USN-6237-3
https://www.cve.org/CVERecord?id=CVE-2023-28322
|
| curl |
CVE-2023-38546 |
LOW |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2024/Jan/34
http://seclists.org/fulldisclosure/2024/Jan/37
http://seclists.org/fulldisclosure/2024/Jan/38
https://access.redhat.com/errata/RHSA-2023:6745
https://access.redhat.com/security/cve/CVE-2023-38546
https://bugzilla.redhat.com/2241933
https://bugzilla.redhat.com/2241938
https://bugzilla.redhat.com/show_bug.cgi?id=2241933
https://bugzilla.redhat.com/show_bug.cgi?id=2241938
https://curl.se/docs/CVE-2023-38546.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546
https://errata.almalinux.org/9/ALSA-2023-6745.html
https://errata.rockylinux.org/RLSA-2023:5763
https://linux.oracle.com/cve/CVE-2023-38546.html
https://linux.oracle.com/errata/ELSA-2023-6745.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
https://nvd.nist.gov/vuln/detail/CVE-2023-38546
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214057
https://support.apple.com/kb/HT214058
https://support.apple.com/kb/HT214063
https://ubuntu.com/security/notices/USN-6429-1
https://ubuntu.com/security/notices/USN-6429-2
https://ubuntu.com/security/notices/USN-6429-3
https://www.cve.org/CVERecord?id=CVE-2023-38546
|
| cyrus-sasl-lib |
CVE-2019-19906 |
MEDIUM |
2.1.26-24.el7_9 |
|
http://seclists.org/fulldisclosure/2020/Jul/23
http://seclists.org/fulldisclosure/2020/Jul/24
http://www.openwall.com/lists/oss-security/2022/02/23/4
https://access.redhat.com/security/cve/CVE-2019-19906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19906
https://github.com/cyrusimap/cyrus-sasl/issues/587
https://linux.oracle.com/cve/CVE-2019-19906.html
https://linux.oracle.com/errata/ELSA-2020-4497.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/12/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MW6GZCLECGL2PBNHVNPJIX4RPVRVFR7R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OB4GSVOJ6ESHQNT5GSV63OX5D4KPSTGT/
https://nvd.nist.gov/vuln/detail/CVE-2019-19906
https://seclists.org/bugtraq/2019/Dec/42
https://support.apple.com/kb/HT211288
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4256-1
https://usn.ubuntu.com/4256-1/
https://www.cve.org/CVERecord?id=CVE-2019-19906
https://www.debian.org/security/2019/dsa-4591
https://www.openldap.org/its/index.cgi/Incoming?id=9123
|
| dbus |
CVE-2014-3477 |
MEDIUM |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0266.html
http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567
http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html
http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://seclists.org/oss-sec/2014/q2/509
http://secunia.com/advisories/59428
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.securityfocus.com/bid/67986
https://access.redhat.com/security/cve/CVE-2014-3477
https://bugs.freedesktop.org/show_bug.cgi?id=78979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477
https://nvd.nist.gov/vuln/detail/CVE-2014-3477
https://ubuntu.com/security/notices/USN-2275-1
https://www.cve.org/CVERecord?id=CVE-2014-3477
|
| dbus |
CVE-2014-3532 |
MEDIUM |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0294.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://openwall.com/lists/oss-security/2014/07/02/4
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://secunia.com/advisories/60236
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
https://access.redhat.com/security/cve/CVE-2014-3532
https://bugs.freedesktop.org/show_bug.cgi?id=80163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532
https://nvd.nist.gov/vuln/detail/CVE-2014-3532
https://ubuntu.com/security/notices/USN-2275-1
https://www.cve.org/CVERecord?id=CVE-2014-3532
|
| dbus |
CVE-2014-3533 |
MEDIUM |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0294.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://openwall.com/lists/oss-security/2014/07/02/4
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://secunia.com/advisories/60236
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
https://access.redhat.com/security/cve/CVE-2014-3533
https://bugs.freedesktop.org/show_bug.cgi?id=79694
https://bugs.freedesktop.org/show_bug.cgi?id=80469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533
https://nvd.nist.gov/vuln/detail/CVE-2014-3533
https://ubuntu.com/security/notices/USN-2275-1
https://www.cve.org/CVERecord?id=CVE-2014-3533
|
| dbus |
CVE-2022-42010 |
MEDIUM |
1:1.10.24-15.el7 |
|
https://access.redhat.com/errata/RHSA-2023:0335
https://access.redhat.com/security/cve/CVE-2022-42010
https://bugzilla.redhat.com/2133616
https://bugzilla.redhat.com/2133617
https://bugzilla.redhat.com/2133618
https://bugzilla.redhat.com/show_bug.cgi?id=2133616
https://bugzilla.redhat.com/show_bug.cgi?id=2133617
https://bugzilla.redhat.com/show_bug.cgi?id=2133618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012
https://errata.almalinux.org/9/ALSA-2023-0335.html
https://errata.rockylinux.org/RLSA-2023:0335
https://gitlab.freedesktop.org/dbus/dbus/-/issues/418
https://linux.oracle.com/cve/CVE-2022-42010.html
https://linux.oracle.com/errata/ELSA-2023-0335.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
https://nvd.nist.gov/vuln/detail/CVE-2022-42010
https://security.gentoo.org/glsa/202305-08
https://ubuntu.com/security/notices/USN-5704-1
https://www.cve.org/CVERecord?id=CVE-2022-42010
https://www.openwall.com/lists/oss-security/2022/10/06/1
|
| dbus |
CVE-2022-42011 |
MEDIUM |
1:1.10.24-15.el7 |
|
https://access.redhat.com/errata/RHSA-2023:0335
https://access.redhat.com/security/cve/CVE-2022-42011
https://bugzilla.redhat.com/2133616
https://bugzilla.redhat.com/2133617
https://bugzilla.redhat.com/2133618
https://bugzilla.redhat.com/show_bug.cgi?id=2133616
https://bugzilla.redhat.com/show_bug.cgi?id=2133617
https://bugzilla.redhat.com/show_bug.cgi?id=2133618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012
https://errata.almalinux.org/9/ALSA-2023-0335.html
https://errata.rockylinux.org/RLSA-2023:0335
https://gitlab.freedesktop.org/dbus/dbus/-/issues/413
https://linux.oracle.com/cve/CVE-2022-42011.html
https://linux.oracle.com/errata/ELSA-2023-0335.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
https://nvd.nist.gov/vuln/detail/CVE-2022-42011
https://security.gentoo.org/glsa/202305-08
https://ubuntu.com/security/notices/USN-5704-1
https://www.cve.org/CVERecord?id=CVE-2022-42011
https://www.openwall.com/lists/oss-security/2022/10/06/1
|
| dbus |
CVE-2022-42012 |
MEDIUM |
1:1.10.24-15.el7 |
|
https://access.redhat.com/errata/RHSA-2023:0335
https://access.redhat.com/security/cve/CVE-2022-42012
https://bugzilla.redhat.com/2133616
https://bugzilla.redhat.com/2133617
https://bugzilla.redhat.com/2133618
https://bugzilla.redhat.com/show_bug.cgi?id=2133616
https://bugzilla.redhat.com/show_bug.cgi?id=2133617
https://bugzilla.redhat.com/show_bug.cgi?id=2133618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012
https://errata.almalinux.org/9/ALSA-2023-0335.html
https://errata.rockylinux.org/RLSA-2023:0335
https://gitlab.freedesktop.org/dbus/dbus/-/issues/417
https://linux.oracle.com/cve/CVE-2022-42012.html
https://linux.oracle.com/errata/ELSA-2023-0335.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
https://nvd.nist.gov/vuln/detail/CVE-2022-42012
https://security.gentoo.org/glsa/202305-08
https://ubuntu.com/security/notices/USN-5704-1
https://www.cve.org/CVERecord?id=CVE-2022-42012
https://www.openwall.com/lists/oss-security/2022/10/06/1
|
| dbus |
CVE-2023-34969 |
MEDIUM |
1:1.10.24-15.el7 |
|
https://access.redhat.com/errata/RHSA-2023:4569
https://access.redhat.com/security/cve/CVE-2023-34969
https://bugzilla.redhat.com/2213166
https://bugzilla.redhat.com/show_bug.cgi?id=2213166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34969
https://errata.almalinux.org/9/ALSA-2023-4569.html
https://errata.rockylinux.org/RLSA-2023:4569
https://gitlab.freedesktop.org/dbus/dbus/-/issues/457
https://linux.oracle.com/cve/CVE-2023-34969.html
https://linux.oracle.com/errata/ELSA-2023-4569.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/
https://nvd.nist.gov/vuln/detail/CVE-2023-34969
https://security.netapp.com/advisory/ntap-20231208-0007/
https://ubuntu.com/security/notices/USN-6372-1
https://www.cve.org/CVERecord?id=CVE-2023-34969
|
| dbus |
CVE-2014-3636 |
LOW |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3636
https://bugs.freedesktop.org/show_bug.cgi?id=82820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
https://nvd.nist.gov/vuln/detail/CVE-2014-3636
https://ubuntu.com/security/notices/USN-2352-1
https://www.cve.org/CVERecord?id=CVE-2014-3636
|
| dbus |
CVE-2014-3637 |
LOW |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.openwall.com/lists/oss-security/2019/06/24/13
http://www.openwall.com/lists/oss-security/2019/06/24/14
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3637
https://bugs.freedesktop.org/show_bug.cgi?id=80559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
https://nvd.nist.gov/vuln/detail/CVE-2014-3637
https://ubuntu.com/security/notices/USN-2352-1
https://www.cve.org/CVERecord?id=CVE-2014-3637
|
| dbus |
CVE-2014-3638 |
LOW |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://secunia.com/advisories/61431
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3638
https://bugs.freedesktop.org/show_bug.cgi?id=81053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
https://nvd.nist.gov/vuln/detail/CVE-2014-3638
https://ubuntu.com/security/notices/USN-2352-1
https://www.cve.org/CVERecord?id=CVE-2014-3638
|
| dbus |
CVE-2014-3639 |
LOW |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://secunia.com/advisories/61431
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3639
https://bugs.freedesktop.org/show_bug.cgi?id=80919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
https://nvd.nist.gov/vuln/detail/CVE-2014-3639
https://ubuntu.com/security/notices/USN-2352-1
https://www.cve.org/CVERecord?id=CVE-2014-3639
|
| dbus |
CVE-2015-0245 |
LOW |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2015-0071.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html
http://www.debian.org/security/2015/dsa-3161
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2015/02/09/6
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
https://access.redhat.com/security/cve/CVE-2015-0245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245
https://nvd.nist.gov/vuln/detail/CVE-2015-0245
https://ubuntu.com/security/notices/USN-3116-1
https://www.cve.org/CVERecord?id=CVE-2015-0245
|
| dbus |
CVE-2020-35512 |
LOW |
1:1.10.24-15.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-35512
https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://nvd.nist.gov/vuln/detail/CVE-2020-35512
https://security-tracker.debian.org/tracker/CVE-2020-35512
https://ubuntu.com/security/notices/USN-5244-1
https://ubuntu.com/security/notices/USN-5244-2
https://www.cve.org/CVERecord?id=CVE-2020-35512
|
| dbus-libs |
CVE-2014-3477 |
MEDIUM |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0266.html
http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567
http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html
http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://seclists.org/oss-sec/2014/q2/509
http://secunia.com/advisories/59428
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.securityfocus.com/bid/67986
https://access.redhat.com/security/cve/CVE-2014-3477
https://bugs.freedesktop.org/show_bug.cgi?id=78979
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477
https://nvd.nist.gov/vuln/detail/CVE-2014-3477
https://ubuntu.com/security/notices/USN-2275-1
https://www.cve.org/CVERecord?id=CVE-2014-3477
|
| dbus-libs |
CVE-2014-3532 |
MEDIUM |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0294.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://openwall.com/lists/oss-security/2014/07/02/4
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://secunia.com/advisories/60236
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
https://access.redhat.com/security/cve/CVE-2014-3532
https://bugs.freedesktop.org/show_bug.cgi?id=80163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532
https://nvd.nist.gov/vuln/detail/CVE-2014-3532
https://ubuntu.com/security/notices/USN-2275-1
https://www.cve.org/CVERecord?id=CVE-2014-3532
|
| dbus-libs |
CVE-2014-3533 |
MEDIUM |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0294.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://openwall.com/lists/oss-security/2014/07/02/4
http://secunia.com/advisories/59611
http://secunia.com/advisories/59798
http://secunia.com/advisories/60236
http://www.debian.org/security/2014/dsa-2971
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
https://access.redhat.com/security/cve/CVE-2014-3533
https://bugs.freedesktop.org/show_bug.cgi?id=79694
https://bugs.freedesktop.org/show_bug.cgi?id=80469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533
https://nvd.nist.gov/vuln/detail/CVE-2014-3533
https://ubuntu.com/security/notices/USN-2275-1
https://www.cve.org/CVERecord?id=CVE-2014-3533
|
| dbus-libs |
CVE-2022-42010 |
MEDIUM |
1:1.10.24-15.el7 |
|
https://access.redhat.com/errata/RHSA-2023:0335
https://access.redhat.com/security/cve/CVE-2022-42010
https://bugzilla.redhat.com/2133616
https://bugzilla.redhat.com/2133617
https://bugzilla.redhat.com/2133618
https://bugzilla.redhat.com/show_bug.cgi?id=2133616
https://bugzilla.redhat.com/show_bug.cgi?id=2133617
https://bugzilla.redhat.com/show_bug.cgi?id=2133618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012
https://errata.almalinux.org/9/ALSA-2023-0335.html
https://errata.rockylinux.org/RLSA-2023:0335
https://gitlab.freedesktop.org/dbus/dbus/-/issues/418
https://linux.oracle.com/cve/CVE-2022-42010.html
https://linux.oracle.com/errata/ELSA-2023-0335.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
https://nvd.nist.gov/vuln/detail/CVE-2022-42010
https://security.gentoo.org/glsa/202305-08
https://ubuntu.com/security/notices/USN-5704-1
https://www.cve.org/CVERecord?id=CVE-2022-42010
https://www.openwall.com/lists/oss-security/2022/10/06/1
|
| dbus-libs |
CVE-2022-42011 |
MEDIUM |
1:1.10.24-15.el7 |
|
https://access.redhat.com/errata/RHSA-2023:0335
https://access.redhat.com/security/cve/CVE-2022-42011
https://bugzilla.redhat.com/2133616
https://bugzilla.redhat.com/2133617
https://bugzilla.redhat.com/2133618
https://bugzilla.redhat.com/show_bug.cgi?id=2133616
https://bugzilla.redhat.com/show_bug.cgi?id=2133617
https://bugzilla.redhat.com/show_bug.cgi?id=2133618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012
https://errata.almalinux.org/9/ALSA-2023-0335.html
https://errata.rockylinux.org/RLSA-2023:0335
https://gitlab.freedesktop.org/dbus/dbus/-/issues/413
https://linux.oracle.com/cve/CVE-2022-42011.html
https://linux.oracle.com/errata/ELSA-2023-0335.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
https://nvd.nist.gov/vuln/detail/CVE-2022-42011
https://security.gentoo.org/glsa/202305-08
https://ubuntu.com/security/notices/USN-5704-1
https://www.cve.org/CVERecord?id=CVE-2022-42011
https://www.openwall.com/lists/oss-security/2022/10/06/1
|
| dbus-libs |
CVE-2022-42012 |
MEDIUM |
1:1.10.24-15.el7 |
|
https://access.redhat.com/errata/RHSA-2023:0335
https://access.redhat.com/security/cve/CVE-2022-42012
https://bugzilla.redhat.com/2133616
https://bugzilla.redhat.com/2133617
https://bugzilla.redhat.com/2133618
https://bugzilla.redhat.com/show_bug.cgi?id=2133616
https://bugzilla.redhat.com/show_bug.cgi?id=2133617
https://bugzilla.redhat.com/show_bug.cgi?id=2133618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012
https://errata.almalinux.org/9/ALSA-2023-0335.html
https://errata.rockylinux.org/RLSA-2023:0335
https://gitlab.freedesktop.org/dbus/dbus/-/issues/417
https://linux.oracle.com/cve/CVE-2022-42012.html
https://linux.oracle.com/errata/ELSA-2023-0335.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
https://nvd.nist.gov/vuln/detail/CVE-2022-42012
https://security.gentoo.org/glsa/202305-08
https://ubuntu.com/security/notices/USN-5704-1
https://www.cve.org/CVERecord?id=CVE-2022-42012
https://www.openwall.com/lists/oss-security/2022/10/06/1
|
| dbus-libs |
CVE-2023-34969 |
MEDIUM |
1:1.10.24-15.el7 |
|
https://access.redhat.com/errata/RHSA-2023:4569
https://access.redhat.com/security/cve/CVE-2023-34969
https://bugzilla.redhat.com/2213166
https://bugzilla.redhat.com/show_bug.cgi?id=2213166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34969
https://errata.almalinux.org/9/ALSA-2023-4569.html
https://errata.rockylinux.org/RLSA-2023:4569
https://gitlab.freedesktop.org/dbus/dbus/-/issues/457
https://linux.oracle.com/cve/CVE-2023-34969.html
https://linux.oracle.com/errata/ELSA-2023-4569.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/
https://nvd.nist.gov/vuln/detail/CVE-2023-34969
https://security.netapp.com/advisory/ntap-20231208-0007/
https://ubuntu.com/security/notices/USN-6372-1
https://www.cve.org/CVERecord?id=CVE-2023-34969
|
| dbus-libs |
CVE-2014-3636 |
LOW |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3636
https://bugs.freedesktop.org/show_bug.cgi?id=82820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636
https://nvd.nist.gov/vuln/detail/CVE-2014-3636
https://ubuntu.com/security/notices/USN-2352-1
https://www.cve.org/CVERecord?id=CVE-2014-3636
|
| dbus-libs |
CVE-2014-3637 |
LOW |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.openwall.com/lists/oss-security/2019/06/24/13
http://www.openwall.com/lists/oss-security/2019/06/24/14
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3637
https://bugs.freedesktop.org/show_bug.cgi?id=80559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637
https://nvd.nist.gov/vuln/detail/CVE-2014-3637
https://ubuntu.com/security/notices/USN-2352-1
https://www.cve.org/CVERecord?id=CVE-2014-3637
|
| dbus-libs |
CVE-2014-3638 |
LOW |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://secunia.com/advisories/61431
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3638
https://bugs.freedesktop.org/show_bug.cgi?id=81053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638
https://nvd.nist.gov/vuln/detail/CVE-2014-3638
https://ubuntu.com/security/notices/USN-2352-1
https://www.cve.org/CVERecord?id=CVE-2014-3638
|
| dbus-libs |
CVE-2014-3639 |
LOW |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0395.html
http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html
http://secunia.com/advisories/61378
http://secunia.com/advisories/61431
http://www.debian.org/security/2014/dsa-3026
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2014/09/16/9
http://www.securitytracker.com/id/1030864
http://www.ubuntu.com/usn/USN-2352-1
https://access.redhat.com/security/cve/CVE-2014-3639
https://bugs.freedesktop.org/show_bug.cgi?id=80919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639
https://nvd.nist.gov/vuln/detail/CVE-2014-3639
https://ubuntu.com/security/notices/USN-2352-1
https://www.cve.org/CVERecord?id=CVE-2014-3639
|
| dbus-libs |
CVE-2015-0245 |
LOW |
1:1.10.24-15.el7 |
|
http://advisories.mageia.org/MGASA-2015-0071.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html
http://www.debian.org/security/2015/dsa-3161
http://www.mandriva.com/security/advisories?name=MDVSA-2015:176
http://www.openwall.com/lists/oss-security/2015/02/09/6
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
https://access.redhat.com/security/cve/CVE-2015-0245
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245
https://nvd.nist.gov/vuln/detail/CVE-2015-0245
https://ubuntu.com/security/notices/USN-3116-1
https://www.cve.org/CVERecord?id=CVE-2015-0245
|
| dbus-libs |
CVE-2020-35512 |
LOW |
1:1.10.24-15.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-35512
https://bugs.gentoo.org/755392
https://bugzilla.redhat.com/show_bug.cgi?id=1909101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512
https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32)
https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20)
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://nvd.nist.gov/vuln/detail/CVE-2020-35512
https://security-tracker.debian.org/tracker/CVE-2020-35512
https://ubuntu.com/security/notices/USN-5244-1
https://ubuntu.com/security/notices/USN-5244-2
https://www.cve.org/CVERecord?id=CVE-2020-35512
|
| device-mapper |
CVE-2020-8991 |
LOW |
7:1.02.170-6.el7_9.5 |
|
https://access.redhat.com/security/cve/CVE-2020-8991
https://nvd.nist.gov/vuln/detail/CVE-2020-8991
https://sourceware.org/git/?p=lvm2.git%3Ba=commit%3Bh=bcf9556b8fcd16ad8997f80cc92785f295c66701
https://www.cve.org/CVERecord?id=CVE-2020-8991
|
| device-mapper-libs |
CVE-2020-8991 |
LOW |
7:1.02.170-6.el7_9.5 |
|
https://access.redhat.com/security/cve/CVE-2020-8991
https://nvd.nist.gov/vuln/detail/CVE-2020-8991
https://sourceware.org/git/?p=lvm2.git%3Ba=commit%3Bh=bcf9556b8fcd16ad8997f80cc92785f295c66701
https://www.cve.org/CVERecord?id=CVE-2020-8991
|
| dracut |
CVE-2016-4484 |
MEDIUM |
033-572.el7 |
|
http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html
http://www.openwall.com/lists/oss-security/2016/11/14/13
http://www.openwall.com/lists/oss-security/2016/11/15/1
http://www.openwall.com/lists/oss-security/2016/11/15/4
http://www.openwall.com/lists/oss-security/2016/11/16/6
http://www.securityfocus.com/bid/94315
https://access.redhat.com/articles/2786581
https://access.redhat.com/security/cve/CVE-2016-4484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4484
https://gitlab.com/cryptsetup/cryptsetup/commit/ef8a7d82d8d3716ae9b58179590f7908981fa0cb
https://nvd.nist.gov/vuln/detail/CVE-2016-4484
https://www.cve.org/CVERecord?id=CVE-2016-4484
|
| elfutils |
CVE-2016-10254 |
LOW |
0.176-5.el7 |
|
http://www.openwall.com/lists/oss-security/2017/03/22/2
https://access.redhat.com/security/cve/CVE-2016-10254
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254
https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
https://nvd.nist.gov/vuln/detail/CVE-2016-10254
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2016-10254
|
| elfutils |
CVE-2016-10255 |
LOW |
0.176-5.el7 |
|
http://www.openwall.com/lists/oss-security/2017/03/22/1
https://access.redhat.com/security/cve/CVE-2016-10255
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
https://bugzilla.redhat.com/show_bug.cgi?id=1387584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255
https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
https://nvd.nist.gov/vuln/detail/CVE-2016-10255
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2016-10255
|
| elfutils |
CVE-2017-7607 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98608
https://access.redhat.com/security/cve/CVE-2017-7607
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607
https://nvd.nist.gov/vuln/detail/CVE-2017-7607
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7607
|
| elfutils |
CVE-2017-7608 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98609
https://access.redhat.com/security/cve/CVE-2017-7608
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7608
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7608
|
| elfutils |
CVE-2017-7609 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7609
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609
https://nvd.nist.gov/vuln/detail/CVE-2017-7609
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7609
|
| elfutils |
CVE-2017-7610 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7610
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7610
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7610
|
| elfutils |
CVE-2017-7611 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7611
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7611
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7611
|
| elfutils |
CVE-2017-7612 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7612
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7612
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7612
|
| elfutils |
CVE-2017-7613 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7613
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7613
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7613
|
| elfutils |
CVE-2021-33294 |
LOW |
0.176-5.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-33294
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33294
https://nvd.nist.gov/vuln/detail/CVE-2021-33294
https://sourceware.org/bugzilla/show_bug.cgi?id=27501
https://sourceware.org/pipermail/elfutils-devel/2021q1/003607.html
https://ubuntu.com/security/notices/USN-6322-1
https://www.cve.org/CVERecord?id=CVE-2021-33294
|
| elfutils |
CVE-2024-25260 |
LOW |
0.176-5.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-25260
https://github.com/schsiung/fuzzer_issues/issues/1
https://nvd.nist.gov/vuln/detail/CVE-2024-25260
https://sourceware.org/bugzilla/show_bug.cgi?id=31058
https://sourceware.org/elfutils/
https://www.cve.org/CVERecord?id=CVE-2024-25260
|
| elfutils-default-yama-scope |
CVE-2016-10254 |
LOW |
0.176-5.el7 |
|
http://www.openwall.com/lists/oss-security/2017/03/22/2
https://access.redhat.com/security/cve/CVE-2016-10254
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254
https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
https://nvd.nist.gov/vuln/detail/CVE-2016-10254
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2016-10254
|
| elfutils-default-yama-scope |
CVE-2016-10255 |
LOW |
0.176-5.el7 |
|
http://www.openwall.com/lists/oss-security/2017/03/22/1
https://access.redhat.com/security/cve/CVE-2016-10255
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
https://bugzilla.redhat.com/show_bug.cgi?id=1387584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255
https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
https://nvd.nist.gov/vuln/detail/CVE-2016-10255
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2016-10255
|
| elfutils-default-yama-scope |
CVE-2017-7607 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98608
https://access.redhat.com/security/cve/CVE-2017-7607
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607
https://nvd.nist.gov/vuln/detail/CVE-2017-7607
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7607
|
| elfutils-default-yama-scope |
CVE-2017-7608 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98609
https://access.redhat.com/security/cve/CVE-2017-7608
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7608
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7608
|
| elfutils-default-yama-scope |
CVE-2017-7609 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7609
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609
https://nvd.nist.gov/vuln/detail/CVE-2017-7609
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7609
|
| elfutils-default-yama-scope |
CVE-2017-7610 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7610
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7610
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7610
|
| elfutils-default-yama-scope |
CVE-2017-7611 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7611
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7611
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7611
|
| elfutils-default-yama-scope |
CVE-2017-7612 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7612
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7612
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7612
|
| elfutils-default-yama-scope |
CVE-2017-7613 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7613
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7613
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7613
|
| elfutils-default-yama-scope |
CVE-2021-33294 |
LOW |
0.176-5.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-33294
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33294
https://nvd.nist.gov/vuln/detail/CVE-2021-33294
https://sourceware.org/bugzilla/show_bug.cgi?id=27501
https://sourceware.org/pipermail/elfutils-devel/2021q1/003607.html
https://ubuntu.com/security/notices/USN-6322-1
https://www.cve.org/CVERecord?id=CVE-2021-33294
|
| elfutils-default-yama-scope |
CVE-2024-25260 |
LOW |
0.176-5.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-25260
https://github.com/schsiung/fuzzer_issues/issues/1
https://nvd.nist.gov/vuln/detail/CVE-2024-25260
https://sourceware.org/bugzilla/show_bug.cgi?id=31058
https://sourceware.org/elfutils/
https://www.cve.org/CVERecord?id=CVE-2024-25260
|
| elfutils-libelf |
CVE-2016-10254 |
LOW |
0.176-5.el7 |
|
http://www.openwall.com/lists/oss-security/2017/03/22/2
https://access.redhat.com/security/cve/CVE-2016-10254
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254
https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
https://nvd.nist.gov/vuln/detail/CVE-2016-10254
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2016-10254
|
| elfutils-libelf |
CVE-2016-10255 |
LOW |
0.176-5.el7 |
|
http://www.openwall.com/lists/oss-security/2017/03/22/1
https://access.redhat.com/security/cve/CVE-2016-10255
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
https://bugzilla.redhat.com/show_bug.cgi?id=1387584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255
https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
https://nvd.nist.gov/vuln/detail/CVE-2016-10255
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2016-10255
|
| elfutils-libelf |
CVE-2017-7607 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98608
https://access.redhat.com/security/cve/CVE-2017-7607
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607
https://nvd.nist.gov/vuln/detail/CVE-2017-7607
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7607
|
| elfutils-libelf |
CVE-2017-7608 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98609
https://access.redhat.com/security/cve/CVE-2017-7608
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7608
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7608
|
| elfutils-libelf |
CVE-2017-7609 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7609
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609
https://nvd.nist.gov/vuln/detail/CVE-2017-7609
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7609
|
| elfutils-libelf |
CVE-2017-7610 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7610
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7610
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7610
|
| elfutils-libelf |
CVE-2017-7611 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7611
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7611
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7611
|
| elfutils-libelf |
CVE-2017-7612 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7612
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7612
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7612
|
| elfutils-libelf |
CVE-2017-7613 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7613
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7613
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7613
|
| elfutils-libelf |
CVE-2021-33294 |
LOW |
0.176-5.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-33294
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33294
https://nvd.nist.gov/vuln/detail/CVE-2021-33294
https://sourceware.org/bugzilla/show_bug.cgi?id=27501
https://sourceware.org/pipermail/elfutils-devel/2021q1/003607.html
https://ubuntu.com/security/notices/USN-6322-1
https://www.cve.org/CVERecord?id=CVE-2021-33294
|
| elfutils-libelf |
CVE-2024-25260 |
LOW |
0.176-5.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-25260
https://github.com/schsiung/fuzzer_issues/issues/1
https://nvd.nist.gov/vuln/detail/CVE-2024-25260
https://sourceware.org/bugzilla/show_bug.cgi?id=31058
https://sourceware.org/elfutils/
https://www.cve.org/CVERecord?id=CVE-2024-25260
|
| elfutils-libs |
CVE-2016-10254 |
LOW |
0.176-5.el7 |
|
http://www.openwall.com/lists/oss-security/2017/03/22/2
https://access.redhat.com/security/cve/CVE-2016-10254
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254
https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/
https://nvd.nist.gov/vuln/detail/CVE-2016-10254
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2016-10254
|
| elfutils-libs |
CVE-2016-10255 |
LOW |
0.176-5.el7 |
|
http://www.openwall.com/lists/oss-security/2017/03/22/1
https://access.redhat.com/security/cve/CVE-2016-10255
https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/
https://bugzilla.redhat.com/show_bug.cgi?id=1387584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255
https://lists.fedorahosted.org/archives/list/elfutils-devel%40lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/
https://nvd.nist.gov/vuln/detail/CVE-2016-10255
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2016-10255
|
| elfutils-libs |
CVE-2017-7607 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98608
https://access.redhat.com/security/cve/CVE-2017-7607
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607
https://nvd.nist.gov/vuln/detail/CVE-2017-7607
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7607
|
| elfutils-libs |
CVE-2017-7608 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
http://www.securityfocus.com/bid/98609
https://access.redhat.com/security/cve/CVE-2017-7608
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7608
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7608
|
| elfutils-libs |
CVE-2017-7609 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7609
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609
https://nvd.nist.gov/vuln/detail/CVE-2017-7609
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7609
|
| elfutils-libs |
CVE-2017-7610 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7610
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7610
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7610
|
| elfutils-libs |
CVE-2017-7611 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7611
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7611
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7611
|
| elfutils-libs |
CVE-2017-7612 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7612
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7612
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7612
|
| elfutils-libs |
CVE-2017-7613 |
LOW |
0.176-5.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html
https://access.redhat.com/security/cve/CVE-2017-7613
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c
https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613
https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7613
https://security.gentoo.org/glsa/201710-10
https://ubuntu.com/security/notices/USN-3670-1
https://usn.ubuntu.com/3670-1/
https://www.cve.org/CVERecord?id=CVE-2017-7613
|
| elfutils-libs |
CVE-2021-33294 |
LOW |
0.176-5.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-33294
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33294
https://nvd.nist.gov/vuln/detail/CVE-2021-33294
https://sourceware.org/bugzilla/show_bug.cgi?id=27501
https://sourceware.org/pipermail/elfutils-devel/2021q1/003607.html
https://ubuntu.com/security/notices/USN-6322-1
https://www.cve.org/CVERecord?id=CVE-2021-33294
|
| elfutils-libs |
CVE-2024-25260 |
LOW |
0.176-5.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-25260
https://github.com/schsiung/fuzzer_issues/issues/1
https://nvd.nist.gov/vuln/detail/CVE-2024-25260
https://sourceware.org/bugzilla/show_bug.cgi?id=31058
https://sourceware.org/elfutils/
https://www.cve.org/CVERecord?id=CVE-2024-25260
|
| emacs-filesystem |
CVE-2022-45939 |
MEDIUM |
1:24.3-23.el7_9.1 |
|
https://access.redhat.com/errata/RHSA-2023:2366
https://access.redhat.com/security/cve/CVE-2022-45939
https://bugzilla.redhat.com/2149380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45939
https://errata.almalinux.org/9/ALSA-2023-2366.html
https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=d48bb4874bc6cd3e69c7a15fc3c91cc141025c51
https://linux.oracle.com/cve/CVE-2022-45939.html
https://linux.oracle.com/errata/ELSA-2023-3042.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00046.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOSK3J7BBAEI4IITW2DRUKLQYUZYKH6Y/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GOXIH2FDEQJEAARE52C3GHTLGQFBYPIB/
https://nvd.nist.gov/vuln/detail/CVE-2022-45939
https://ubuntu.com/security/notices/USN-5781-1
https://www.cve.org/CVERecord?id=CVE-2022-45939
https://www.debian.org/security/2023/dsa-5314
|
| emacs-filesystem |
CVE-2022-48337 |
MEDIUM |
1:24.3-23.el7_9.1 |
|
https://access.redhat.com/errata/RHSA-2023:2626
https://access.redhat.com/security/cve/CVE-2022-48337
https://bugzilla.redhat.com/2171987
https://bugzilla.redhat.com/2171988
https://bugzilla.redhat.com/2171989
https://bugzilla.redhat.com/2192873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48337
https://errata.almalinux.org/9/ALSA-2023-2626.html
https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=01a4035c869b91c153af9a9132c87adb7669ea1c
https://linux.oracle.com/cve/CVE-2022-48337.html
https://linux.oracle.com/errata/ELSA-2023-7083.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/
https://nvd.nist.gov/vuln/detail/CVE-2022-48337
https://www.cve.org/CVERecord?id=CVE-2022-48337
https://www.debian.org/security/2023/dsa-5360
|
| emacs-filesystem |
CVE-2022-48338 |
MEDIUM |
1:24.3-23.el7_9.1 |
|
https://access.redhat.com/errata/RHSA-2023:2626
https://access.redhat.com/security/cve/CVE-2022-48338
https://bugzilla.redhat.com/2171987
https://bugzilla.redhat.com/2171988
https://bugzilla.redhat.com/2171989
https://bugzilla.redhat.com/2192873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48338
https://errata.almalinux.org/9/ALSA-2023-2626.html
https://git.savannah.gnu.org/cgit/emacs.git/commit/?id=9a3b08061feea14d6f37685ca1ab8801758bfd1c
https://linux.oracle.com/cve/CVE-2022-48338.html
https://linux.oracle.com/errata/ELSA-2023-2626.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FLPQ4K6H2S5TY3L5UDN4K4B3L5RQJYQ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6HDBUQNAH2WL4MHWCTUZLN7NGF7CHTK/
https://nvd.nist.gov/vuln/detail/CVE-2022-48338
https://www.cve.org/CVERecord?id=CVE-2022-48338
https://www.debian.org/security/2023/dsa-5360
|
| emacs-filesystem |
CVE-2014-3421 |
LOW |
1:24.3-23.el7_9.1 |
|
http://advisories.mageia.org/MGASA-2014-0250.html
http://debbugs.gnu.org/cgi/bugreport.cgi?bug=17428#8
http://lists.gnu.org/archive/html/emacs-diffs/2014-05/msg00055.html
http://openwall.com/lists/oss-security/2014/05/07/7
http://www.mandriva.com/security/advisories?name=MDVSA-2015:117
https://access.redhat.com/security/cve/CVE-2014-3421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3421
https://nvd.nist.gov/vuln/detail/CVE-2014-3421
https://www.cve.org/CVERecord?id=CVE-2014-3421
|
| emacs-filesystem |
CVE-2014-3422 |
LOW |
1:24.3-23.el7_9.1 |
|
http://advisories.mageia.org/MGASA-2014-0250.html
http://debbugs.gnu.org/cgi/bugreport.cgi?bug=17428#8
http://lists.gnu.org/archive/html/emacs-diffs/2014-05/msg00056.html
http://openwall.com/lists/oss-security/2014/05/07/7
http://www.mandriva.com/security/advisories?name=MDVSA-2015:117
https://access.redhat.com/security/cve/CVE-2014-3422
https://nvd.nist.gov/vuln/detail/CVE-2014-3422
https://www.cve.org/CVERecord?id=CVE-2014-3422
|
| emacs-filesystem |
CVE-2014-3423 |
LOW |
1:24.3-23.el7_9.1 |
|
http://advisories.mageia.org/MGASA-2014-0250.html
http://debbugs.gnu.org/cgi/bugreport.cgi?bug=17428#8
http://lists.gnu.org/archive/html/emacs-diffs/2014-05/msg00057.html
http://openwall.com/lists/oss-security/2014/05/07/7
http://www.mandriva.com/security/advisories?name=MDVSA-2015:117
https://access.redhat.com/security/cve/CVE-2014-3423
https://nvd.nist.gov/vuln/detail/CVE-2014-3423
https://www.cve.org/CVERecord?id=CVE-2014-3423
|
| emacs-filesystem |
CVE-2014-3424 |
LOW |
1:24.3-23.el7_9.1 |
|
http://advisories.mageia.org/MGASA-2014-0250.html
http://debbugs.gnu.org/cgi/bugreport.cgi?bug=17428#8
http://lists.gnu.org/archive/html/emacs-diffs/2014-05/msg00060.html
http://openwall.com/lists/oss-security/2014/05/07/7
http://www.mandriva.com/security/advisories?name=MDVSA-2015:117
https://access.redhat.com/security/cve/CVE-2014-3424
https://nvd.nist.gov/vuln/detail/CVE-2014-3424
https://www.cve.org/CVERecord?id=CVE-2014-3424
|
| emacs-filesystem |
CVE-2017-1000383 |
LOW |
1:24.3-23.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2017/10/31/1
http://www.securityfocus.com/bid/101671
https://access.redhat.com/security/cve/CVE-2017-1000383
https://nvd.nist.gov/vuln/detail/CVE-2017-1000383
https://www.cve.org/CVERecord?id=CVE-2017-1000383
|
| expat |
CVE-2012-6702 |
MEDIUM |
2.1.0-15.el7_9 |
|
http://seclists.org/oss-sec/2016/q2/468
http://www.debian.org/security/2016/dsa-3597
http://www.openwall.com/lists/oss-security/2016/06/03/8
http://www.openwall.com/lists/oss-security/2016/06/04/1
http://www.securityfocus.com/bid/91483
http://www.ubuntu.com/usn/USN-3010-1
https://access.redhat.com/security/cve/CVE-2012-6702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702
https://nvd.nist.gov/vuln/detail/CVE-2012-6702
https://security.gentoo.org/glsa/201701-21
https://source.android.com/security/bulletin/2016-11-01.html
https://ubuntu.com/security/notices/USN-3010-1
https://ubuntu.com/security/notices/USN-3013-1
https://www.cve.org/CVERecord?id=CVE-2012-6702
https://www.tenable.com/security/tns-2016-20
|
| expat |
CVE-2013-0340 |
MEDIUM |
2.1.0-15.el7_9 |
|
http://openwall.com/lists/oss-security/2013/02/22/3
http://seclists.org/fulldisclosure/2021/Oct/61
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Sep/33
http://seclists.org/fulldisclosure/2021/Sep/34
http://seclists.org/fulldisclosure/2021/Sep/35
http://seclists.org/fulldisclosure/2021/Sep/38
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
http://securitytracker.com/id?1028213
http://www.openwall.com/lists/oss-security/2013/04/12/6
http://www.openwall.com/lists/oss-security/2021/10/07/4
http://www.osvdb.org/90634
http://www.securityfocus.com/bid/58233
https://access.redhat.com/security/cve/CVE-2013-0340
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-0340
https://security.gentoo.org/glsa/201701-21
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://support.apple.com/kb/HT212807
https://support.apple.com/kb/HT212814
https://support.apple.com/kb/HT212815
https://support.apple.com/kb/HT212819
https://www.cve.org/CVERecord?id=CVE-2013-0340
|
| expat |
CVE-2013-0341 |
MEDIUM |
2.1.0-15.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2013-0341
https://nvd.nist.gov/vuln/detail/CVE-2013-0341
https://www.cve.org/CVERecord?id=CVE-2013-0341
|
| expat |
CVE-2016-4472 |
MEDIUM |
2.1.0-15.el7_9 |
|
http://www.securityfocus.com/bid/91528
http://www.ubuntu.com/usn/USN-3013-1
https://access.redhat.com/security/cve/CVE-2016-4472
https://bugzilla.redhat.com/show_bug.cgi?id=1344251
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://nvd.nist.gov/vuln/detail/CVE-2016-4472
https://security.gentoo.org/glsa/201701-21
https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
https://ubuntu.com/security/notices/USN-3013-1
https://ubuntu.com/security/notices/USN-5455-1
https://www.cve.org/CVERecord?id=CVE-2016-4472
https://www.tenable.com/security/tns-2016-20
|
| expat |
CVE-2016-5300 |
MEDIUM |
2.1.0-15.el7_9 |
|
http://seclists.org/oss-sec/2016/q2/468
http://www.debian.org/security/2016/dsa-3597
http://www.openwall.com/lists/oss-security/2016/06/04/4
http://www.openwall.com/lists/oss-security/2016/06/04/5
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91159
http://www.ubuntu.com/usn/USN-3010-1
https://access.redhat.com/security/cve/CVE-2016-5300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-5300
https://security.gentoo.org/glsa/201701-21
https://source.android.com/security/bulletin/2016-11-01.html
https://ubuntu.com/security/notices/USN-3010-1
https://ubuntu.com/security/notices/USN-3013-1
https://www.cve.org/CVERecord?id=CVE-2016-5300
https://www.tenable.com/security/tns-2016-20
|
| expat |
CVE-2017-9233 |
MEDIUM |
2.1.0-15.el7_9 |
|
http://www.debian.org/security/2017/dsa-3898
http://www.openwall.com/lists/oss-security/2017/06/17/7
http://www.securityfocus.com/bid/99276
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-9233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233
https://github.com/libexpat/libexpat/blob/master/expat/Changes
https://libexpat.github.io/doc/cve-2017-9233/
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-9233
https://support.apple.com/HT208112
https://support.apple.com/HT208113
https://support.apple.com/HT208115
https://support.apple.com/HT208144
https://support.f5.com/csp/article/K03244804
https://ubuntu.com/security/notices/USN-3356-1
https://ubuntu.com/security/notices/USN-3356-2
https://ubuntu.com/security/notices/USN-4825-1
https://www.cve.org/CVERecord?id=CVE-2017-9233
|
| expat |
CVE-2022-23990 |
MEDIUM |
2.1.0-15.el7_9 |
|
https://access.redhat.com/errata/RHSA-2022:7811
https://access.redhat.com/security/cve/CVE-2022-23990
https://bugzilla.redhat.com/2048356
https://bugzilla.redhat.com/2056350
https://bugzilla.redhat.com/2056354
https://bugzilla.redhat.com/2056363
https://bugzilla.redhat.com/2056366
https://bugzilla.redhat.com/2056370
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990
https://errata.almalinux.org/8/ALSA-2022-7811.html
https://github.com/libexpat/libexpat/pull/551
https://linux.oracle.com/cve/CVE-2022-23990.html
https://linux.oracle.com/errata/ELSA-2022-9232.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/
https://nvd.nist.gov/vuln/detail/CVE-2022-23990
https://security.gentoo.org/glsa/202209-24
https://ubuntu.com/security/notices/USN-5288-1
https://www.cve.org/CVERecord?id=CVE-2022-23990
https://www.debian.org/security/2022/dsa-5073
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.tenable.com/security/tns-2022-05
|
| expat |
CVE-2022-25313 |
MEDIUM |
2.1.0-15.el7_9 |
|
http://www.openwall.com/lists/oss-security/2022/02/19/1
https://access.redhat.com/errata/RHSA-2022:5244
https://access.redhat.com/security/cve/CVE-2022-25313
https://blog.hartwork.org/posts/expat-2-4-5-released/
https://bugzilla.redhat.com/2056350
https://bugzilla.redhat.com/2056354
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313
https://errata.almalinux.org/9/ALSA-2022-5244.html
https://github.com/libexpat/libexpat/pull/558
https://linux.oracle.com/cve/CVE-2022-25313.html
https://linux.oracle.com/errata/ELSA-2022-5314.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/
https://nvd.nist.gov/vuln/detail/CVE-2022-25313
https://security.gentoo.org/glsa/202209-24
https://security.netapp.com/advisory/ntap-20220303-0008/
https://ubuntu.com/security/notices/USN-5320-1
https://www.cve.org/CVERecord?id=CVE-2022-25313
https://www.debian.org/security/2022/dsa-5085
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| expat |
CVE-2022-43680 |
MEDIUM |
2.1.0-15.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/12/28/5
http://www.openwall.com/lists/oss-security/2024/01/03/5
https://access.redhat.com/errata/RHSA-2023:0337
https://access.redhat.com/security/cve/CVE-2022-43680
https://bugzilla.redhat.com/2140059
https://bugzilla.redhat.com/show_bug.cgi?id=2140059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680
https://errata.almalinux.org/9/ALSA-2023-0337.html
https://errata.rockylinux.org/RLSA-2023:0337
https://github.com/libexpat/libexpat/issues/649
https://github.com/libexpat/libexpat/pull/616
https://github.com/libexpat/libexpat/pull/650
https://linux.oracle.com/cve/CVE-2022-43680.html
https://linux.oracle.com/errata/ELSA-2023-0337.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPQVIF6TOJNY2T3ZZETFKR4G34FFREBQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFCOMBSOJKLIKCGCJWHLJXO4EVYBG7AR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5XOOB7CD55CEE6OJYKSACSIMQ4RWQ6/
https://nvd.nist.gov/vuln/detail/CVE-2022-43680
https://security.gentoo.org/glsa/202210-38
https://security.netapp.com/advisory/ntap-20221118-0007/
https://ubuntu.com/security/notices/USN-5638-2
https://ubuntu.com/security/notices/USN-5638-3
https://ubuntu.com/security/notices/USN-5638-4
https://www.cve.org/CVERecord?id=CVE-2022-43680
https://www.debian.org/security/2022/dsa-5266
|
| expat |
CVE-2023-52425 |
MEDIUM |
2.1.0-15.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-52425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425
https://github.com/libexpat/libexpat/pull/789
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/
https://nvd.nist.gov/vuln/detail/CVE-2023-52425
https://ubuntu.com/security/notices/USN-6694-1
https://www.cve.org/CVERecord?id=CVE-2023-52425
|
| expat |
CVE-2023-52426 |
MEDIUM |
2.1.0-15.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-52426
https://cwe.mitre.org/data/definitions/776.html
https://github.com/libexpat/libexpat/commit/0f075ec8ecb5e43f8fdca5182f8cca4703da0404
https://github.com/libexpat/libexpat/pull/777
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/
https://nvd.nist.gov/vuln/detail/CVE-2023-52426
https://security.netapp.com/advisory/ntap-20240307-0005/
https://www.cve.org/CVERecord?id=CVE-2023-52426
|
| expat |
CVE-2024-28757 |
MEDIUM |
2.1.0-15.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2024-28757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28757
https://github.com/libexpat/libexpat/issues/839
https://github.com/libexpat/libexpat/pull/842
https://nvd.nist.gov/vuln/detail/CVE-2024-28757
https://ubuntu.com/security/notices/USN-6694-1
https://www.cve.org/CVERecord?id=CVE-2024-28757
|
| expat |
CVE-2016-9063 |
LOW |
2.1.0-15.el7_9 |
|
http://www.securityfocus.com/bid/94337
http://www.securitytracker.com/id/1037298
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2016-9063
https://bugzilla.mozilla.org/show_bug.cgi?id=1274777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063
https://nvd.nist.gov/vuln/detail/CVE-2016-9063
https://ubuntu.com/security/notices/USN-3124-1
https://www.cve.org/CVERecord?id=CVE-2016-9063
https://www.debian.org/security/2017/dsa-3898
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9063
https://www.mozilla.org/security/advisories/mfsa2016-89/
|
| file |
CVE-2014-9620 |
LOW |
5.11-37.el7 |
|
http://advisories.mageia.org/MGASA-2015-0040.html
http://mx.gw.com/pipermail/file/2014/001653.html
http://mx.gw.com/pipermail/file/2015/001660.html
http://rhn.redhat.com/errata/RHSA-2016-0760.html
http://www.debian.org/security/2015/dsa-3121
http://www.openwall.com/lists/oss-security/2015/01/17/9
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/71715
https://access.redhat.com/security/cve/CVE-2014-9620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620
https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4
https://linux.oracle.com/cve/CVE-2014-9620.html
https://linux.oracle.com/errata/ELSA-2016-0760.html
https://nvd.nist.gov/vuln/detail/CVE-2014-9620
https://security.gentoo.org/glsa/201503-08
https://ubuntu.com/security/notices/USN-3686-1
https://usn.ubuntu.com/3686-1/
https://www.cve.org/CVERecord?id=CVE-2014-9620
|
| file |
CVE-2015-8865 |
LOW |
5.11-37.el7 |
|
http://bugs.gw.com/view.php?id=522
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=fe13566c93f118a15a96320a546c7878fd0cfc5e
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85802
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8865
https://bugs.php.net/bug.php?id=71527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://nvd.nist.gov/vuln/detail/CVE-2015-8865
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
https://www.cve.org/CVERecord?id=CVE-2015-8865
|
| file |
CVE-2022-48554 |
LOW |
5.11-37.el7 |
|
http://seclists.org/fulldisclosure/2024/Mar/21
http://seclists.org/fulldisclosure/2024/Mar/24
http://seclists.org/fulldisclosure/2024/Mar/25
https://access.redhat.com/security/cve/CVE-2022-48554
https://bugs.astron.com/view.php?id=310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48554
https://nvd.nist.gov/vuln/detail/CVE-2022-48554
https://security.netapp.com/advisory/ntap-20231116-0002/
https://support.apple.com/kb/HT214081
https://support.apple.com/kb/HT214084
https://support.apple.com/kb/HT214086
https://support.apple.com/kb/HT214088
https://ubuntu.com/security/notices/USN-6359-1
https://www.cve.org/CVERecord?id=CVE-2022-48554
https://www.debian.org/security/2023/dsa-5489
|
| file-libs |
CVE-2014-9620 |
LOW |
5.11-37.el7 |
|
http://advisories.mageia.org/MGASA-2015-0040.html
http://mx.gw.com/pipermail/file/2014/001653.html
http://mx.gw.com/pipermail/file/2015/001660.html
http://rhn.redhat.com/errata/RHSA-2016-0760.html
http://www.debian.org/security/2015/dsa-3121
http://www.openwall.com/lists/oss-security/2015/01/17/9
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/71715
https://access.redhat.com/security/cve/CVE-2014-9620
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620
https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4
https://linux.oracle.com/cve/CVE-2014-9620.html
https://linux.oracle.com/errata/ELSA-2016-0760.html
https://nvd.nist.gov/vuln/detail/CVE-2014-9620
https://security.gentoo.org/glsa/201503-08
https://ubuntu.com/security/notices/USN-3686-1
https://usn.ubuntu.com/3686-1/
https://www.cve.org/CVERecord?id=CVE-2014-9620
|
| file-libs |
CVE-2015-8865 |
LOW |
5.11-37.el7 |
|
http://bugs.gw.com/view.php?id=522
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=fe13566c93f118a15a96320a546c7878fd0cfc5e
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.debian.org/security/2016/dsa-3560
http://www.openwall.com/lists/oss-security/2016/04/11/7
http://www.openwall.com/lists/oss-security/2016/04/24/1
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/85802
http://www.ubuntu.com/usn/USN-2952-1
http://www.ubuntu.com/usn/USN-2952-2
https://access.redhat.com/security/cve/CVE-2015-8865
https://bugs.php.net/bug.php?id=71527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865
https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://nvd.nist.gov/vuln/detail/CVE-2015-8865
https://security.gentoo.org/glsa/201611-22
https://security.gentoo.org/glsa/201701-42
https://support.apple.com/HT206567
https://ubuntu.com/security/notices/USN-2952-1
https://ubuntu.com/security/notices/USN-2984-1
https://ubuntu.com/security/notices/USN-3686-1
https://ubuntu.com/security/notices/USN-3686-2
https://usn.ubuntu.com/3686-1/
https://usn.ubuntu.com/3686-2/
https://www.cve.org/CVERecord?id=CVE-2015-8865
|
| file-libs |
CVE-2022-48554 |
LOW |
5.11-37.el7 |
|
http://seclists.org/fulldisclosure/2024/Mar/21
http://seclists.org/fulldisclosure/2024/Mar/24
http://seclists.org/fulldisclosure/2024/Mar/25
https://access.redhat.com/security/cve/CVE-2022-48554
https://bugs.astron.com/view.php?id=310
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48554
https://nvd.nist.gov/vuln/detail/CVE-2022-48554
https://security.netapp.com/advisory/ntap-20231116-0002/
https://support.apple.com/kb/HT214081
https://support.apple.com/kb/HT214084
https://support.apple.com/kb/HT214086
https://support.apple.com/kb/HT214088
https://ubuntu.com/security/notices/USN-6359-1
https://www.cve.org/CVERecord?id=CVE-2022-48554
https://www.debian.org/security/2023/dsa-5489
|
| freetype |
CVE-2016-10244 |
MEDIUM |
2.8-14.el7_9.1 |
|
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog?h=VER-2-7
http://www.debian.org/security/2017/dsa-3839
http://www.securityfocus.com/bid/97405
http://www.securitytracker.com/id/1038090
http://www.securitytracker.com/id/1038201
https://access.redhat.com/security/cve/CVE-2016-10244
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
https://nvd.nist.gov/vuln/detail/CVE-2016-10244
https://security.gentoo.org/glsa/201706-14
https://source.android.com/security/bulletin/2017-04-01
https://ubuntu.com/security/notices/USN-3237-1
https://www.cve.org/CVERecord?id=CVE-2016-10244
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| freetype |
CVE-2017-8105 |
MEDIUM |
2.8-14.el7_9.1 |
|
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
http://www.debian.org/security/2017/dsa-3839
http://www.securityfocus.com/bid/99093
https://access.redhat.com/security/cve/CVE-2017-8105
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
https://nvd.nist.gov/vuln/detail/CVE-2017-8105
https://security.gentoo.org/glsa/201706-14
https://ubuntu.com/security/notices/USN-3282-1
https://ubuntu.com/security/notices/USN-3282-2
https://www.cve.org/CVERecord?id=CVE-2017-8105
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| freetype |
CVE-2017-8287 |
MEDIUM |
2.8-14.el7_9.1 |
|
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0
http://www.debian.org/security/2017/dsa-3839
http://www.securityfocus.com/bid/99091
https://access.redhat.com/security/cve/CVE-2017-8287
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
https://nvd.nist.gov/vuln/detail/CVE-2017-8287
https://security.gentoo.org/glsa/201706-14
https://ubuntu.com/security/notices/USN-3282-1
https://ubuntu.com/security/notices/USN-3282-2
https://www.cve.org/CVERecord?id=CVE-2017-8287
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| freetype |
CVE-2022-27404 |
MEDIUM |
2.8-14.el7_9.1 |
|
https://access.redhat.com/errata/RHSA-2022:8340
https://access.redhat.com/security/cve/CVE-2022-27404
https://bugzilla.redhat.com/2077985
https://bugzilla.redhat.com/2077989
https://bugzilla.redhat.com/2077991
https://bugzilla.redhat.com/show_bug.cgi?id=2077985
https://bugzilla.redhat.com/show_bug.cgi?id=2077989
https://bugzilla.redhat.com/show_bug.cgi?id=2077991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
https://errata.almalinux.org/9/ALSA-2022-8340.html
https://errata.rockylinux.org/RLSA-2022:8340
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
https://linux.oracle.com/cve/CVE-2022-27404.html
https://linux.oracle.com/errata/ELSA-2022-8340.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27404
https://security.gentoo.org/glsa/202402-06
https://ubuntu.com/security/notices/USN-5528-1
https://www.cve.org/CVERecord?id=CVE-2022-27404
|
| freetype |
CVE-2022-27405 |
MEDIUM |
2.8-14.el7_9.1 |
|
http://freetype.com
https://access.redhat.com/errata/RHSA-2022:8340
https://access.redhat.com/security/cve/CVE-2022-27405
https://bugzilla.redhat.com/2077985
https://bugzilla.redhat.com/2077989
https://bugzilla.redhat.com/2077991
https://bugzilla.redhat.com/show_bug.cgi?id=2077985
https://bugzilla.redhat.com/show_bug.cgi?id=2077989
https://bugzilla.redhat.com/show_bug.cgi?id=2077991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
https://errata.almalinux.org/9/ALSA-2022-8340.html
https://errata.rockylinux.org/RLSA-2022:8340
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
https://linux.oracle.com/cve/CVE-2022-27405.html
https://linux.oracle.com/errata/ELSA-2022-8340.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27405
https://security.gentoo.org/glsa/202402-06
https://ubuntu.com/security/notices/USN-5528-1
https://www.cve.org/CVERecord?id=CVE-2022-27405
|
| freetype |
CVE-2022-27406 |
MEDIUM |
2.8-14.el7_9.1 |
|
http://freetype.com
https://access.redhat.com/errata/RHSA-2022:8340
https://access.redhat.com/security/cve/CVE-2022-27406
https://bugzilla.redhat.com/2077985
https://bugzilla.redhat.com/2077989
https://bugzilla.redhat.com/2077991
https://bugzilla.redhat.com/show_bug.cgi?id=2077985
https://bugzilla.redhat.com/show_bug.cgi?id=2077989
https://bugzilla.redhat.com/show_bug.cgi?id=2077991
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
https://errata.almalinux.org/9/ALSA-2022-8340.html
https://errata.rockylinux.org/RLSA-2022:8340
https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
https://linux.oracle.com/cve/CVE-2022-27406.html
https://linux.oracle.com/errata/ELSA-2022-8340.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/
https://nvd.nist.gov/vuln/detail/CVE-2022-27406
https://security.gentoo.org/glsa/202402-06
https://ubuntu.com/security/notices/USN-5453-1
https://ubuntu.com/security/notices/USN-5528-1
https://www.cve.org/CVERecord?id=CVE-2022-27406
|
| freetype |
CVE-2014-9745 |
LOW |
2.8-14.el7_9.1 |
|
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75
http://lists.opensuse.org/opensuse-updates/2015-10/msg00017.html
http://savannah.nongnu.org/bugs/index.php?41590
http://www.debian.org/security/2015/dsa-3370
http://www.securityfocus.com/bid/76727
http://www.securitytracker.com/id/1033536
http://www.ubuntu.com/usn/USN-2739-1
https://access.redhat.com/security/cve/CVE-2014-9745
https://bugs.launchpad.net/ubuntu/+source/freetype/+bug/1492124
https://code.google.com/p/chromium/issues/detail?id=459050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
https://nvd.nist.gov/vuln/detail/CVE-2014-9745
https://ubuntu.com/security/notices/USN-2739-1
https://www.cve.org/CVERecord?id=CVE-2014-9745
|
| freetype |
CVE-2014-9746 |
LOW |
2.8-14.el7_9.1 |
|
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1
http://www.debian.org/security/2015/dsa-3370
http://www.openwall.com/lists/oss-security/2015/09/11/4
http://www.openwall.com/lists/oss-security/2015/09/25/4
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
https://access.redhat.com/security/cve/CVE-2014-9746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
https://nvd.nist.gov/vuln/detail/CVE-2014-9746
https://savannah.nongnu.org/bugs/?41309
https://ubuntu.com/security/notices/USN-2739-1
https://www.cve.org/CVERecord?id=CVE-2014-9746
|
| freetype |
CVE-2014-9747 |
LOW |
2.8-14.el7_9.1 |
|
http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1
http://www.debian.org/security/2015/dsa-3370
http://www.openwall.com/lists/oss-security/2015/09/11/4
http://www.openwall.com/lists/oss-security/2015/09/25
http://www.openwall.com/lists/oss-security/2015/09/25/4
https://access.redhat.com/security/cve/CVE-2014-9747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
https://nvd.nist.gov/vuln/detail/CVE-2014-9747
https://savannah.nongnu.org/bugs/?41309
https://ubuntu.com/security/notices/USN-2739-1
https://www.cve.org/CVERecord?id=CVE-2014-9747
|
| freetype |
CVE-2018-6942 |
LOW |
2.8-14.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00054.html
https://access.redhat.com/security/cve/CVE-2018-6942
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=29c759284e305ec428703c9a5831d0b1fc3497ef
https://nvd.nist.gov/vuln/detail/CVE-2018-6942
https://ubuntu.com/security/notices/USN-3572-1
https://usn.ubuntu.com/3572-1/
https://www.cve.org/CVERecord?id=CVE-2018-6942
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| gawk |
CVE-2023-4156 |
LOW |
4.0.2-4.el7_3.1 |
|
https://access.redhat.com/security/cve/CVE-2023-4156
https://bugzilla.redhat.com/show_bug.cgi?id=2215930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4156
https://git.savannah.gnu.org/gitweb/?p=gawk.git;a=commitdiff;h=e709eb829448ce040087a3fc5481db6bfcaae212 (gawk-5.2.0)
https://mail.gnu.org/archive/html/bug-gawk/2022-08/msg00000.html
https://mail.gnu.org/archive/html/bug-gawk/2022-08/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4156
https://ubuntu.com/security/notices/USN-6373-1
https://www.cve.org/CVERecord?id=CVE-2023-4156
|
| gcc |
CVE-2014-5044 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
https://nvd.nist.gov/vuln/detail/CVE-2014-5044
https://www.cve.org/CVERecord?id=CVE-2014-5044
|
| gcc |
CVE-2018-20673 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20673
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
https://www.cve.org/CVERecord?id=CVE-2018-20673
|
| gcc |
CVE-2019-16276 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://nvd.nist.gov/vuln/detail/CVE-2019-16276
https://security.netapp.com/advisory/ntap-20191122-0004/
https://www.cve.org/CVERecord?id=CVE-2019-16276
|
| gcc |
CVE-2020-16845 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002
https://security.netapp.com/advisory/ntap-20200924-0002/
https://ubuntu.com/security/notices/USN-5725-1
https://ubuntu.com/security/notices/USN-5725-2
https://www.cve.org/CVERecord?id=CVE-2020-16845
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| gcc |
CVE-2020-24553 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://groups.google.com/forum/#%21topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.cve.org/CVERecord?id=CVE-2020-24553
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| gcc |
CVE-2020-28362 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
https://www.cve.org/CVERecord?id=CVE-2020-28362
|
| gcc |
CVE-2020-28366 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://go.dev/cl/269658
https://go.dev/issue/42559
https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://pkg.go.dev/vuln/GO-2022-0475
https://www.cve.org/CVERecord?id=CVE-2020-28366
|
| gcc |
CVE-2020-28367 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://go.dev/cl/267277
https://go.dev/issue/42556
https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://pkg.go.dev/vuln/GO-2022-0476
https://www.cve.org/CVERecord?id=CVE-2020-28367
|
| gcc |
CVE-2021-27918 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
https://security.gentoo.org/glsa/202208-02
https://www.cve.org/CVERecord?id=CVE-2021-27918
|
| gcc |
CVE-2021-42574 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://bugzilla.redhat.com/show_bug.cgi?id=2005819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574
https://errata.rockylinux.org/RLSA-2021:4585
https://github.com/rust-lang/rust/commit/dd61274930ec0cd17711fab52d2bc9ad3e9053de (1.56.1)
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-42574
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42574
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.openwall.com/lists/oss-security/2021/11/01/1
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.starwindsoftware.com/security/sw-20220804-0002/
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| gcc |
CVE-2021-42694 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://nvd.nist.gov/vuln/detail/CVE-2021-42694
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42694
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
|
| gcc |
CVE-2015-5276 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
https://nvd.nist.gov/vuln/detail/CVE-2015-5276
https://www.cve.org/CVERecord?id=CVE-2015-5276
|
| gcc |
CVE-2016-2226 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://nvd.nist.gov/vuln/detail/CVE-2016-2226
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-2226
https://www.exploit-db.com/exploits/42386/
|
| gcc |
CVE-2016-4487 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4487
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4487
|
| gcc |
CVE-2016-4488 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4488
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4488
|
| gcc |
CVE-2016-4489 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://nvd.nist.gov/vuln/detail/CVE-2016-4489
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4489
|
| gcc |
CVE-2016-4490 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://nvd.nist.gov/vuln/detail/CVE-2016-4490
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4490
|
| gcc |
CVE-2016-4491 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4491
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4491
|
| gcc |
CVE-2016-4492 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=03ef0c6c55ab81002abef62cec430d0496c3a01c
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4492
|
| gcc |
CVE-2016-4493 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4493
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4493
|
| gcc |
CVE-2018-20657 |
LOW |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20657
https://support.f5.com/csp/article/K62602089
https://www.cve.org/CVERecord?id=CVE-2018-20657
|
| gcc |
CVE-2019-14250 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-14250
|
| gcc |
CVE-2021-3826 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6372
https://access.redhat.com/security/cve/CVE-2021-3826
https://bugzilla.redhat.com/2122627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
https://errata.almalinux.org/9/ALSA-2023-6372.html
https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987
https://linux.oracle.com/cve/CVE-2021-3826.html
https://linux.oracle.com/errata/ELSA-2023-6372.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2021-3826
https://www.cve.org/CVERecord?id=CVE-2021-3826
|
| gcc |
CVE-2021-46195 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8415
https://access.redhat.com/security/cve/CVE-2021-46195
https://bugzilla.redhat.com/2046300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195
https://errata.almalinux.org/9/ALSA-2022-8415.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=f10bec5ffa487ad3033ed5f38cfd0fc7d696deab
https://linux.oracle.com/cve/CVE-2021-46195.html
https://linux.oracle.com/errata/ELSA-2022-8415.html
https://nvd.nist.gov/vuln/detail/CVE-2021-46195
https://www.cve.org/CVERecord?id=CVE-2021-46195
|
| gcc |
CVE-2022-27943 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-27943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
|
| gcc-c++ |
CVE-2014-5044 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
https://nvd.nist.gov/vuln/detail/CVE-2014-5044
https://www.cve.org/CVERecord?id=CVE-2014-5044
|
| gcc-c++ |
CVE-2018-20673 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20673
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
https://www.cve.org/CVERecord?id=CVE-2018-20673
|
| gcc-c++ |
CVE-2019-16276 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://nvd.nist.gov/vuln/detail/CVE-2019-16276
https://security.netapp.com/advisory/ntap-20191122-0004/
https://www.cve.org/CVERecord?id=CVE-2019-16276
|
| gcc-c++ |
CVE-2020-16845 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002
https://security.netapp.com/advisory/ntap-20200924-0002/
https://ubuntu.com/security/notices/USN-5725-1
https://ubuntu.com/security/notices/USN-5725-2
https://www.cve.org/CVERecord?id=CVE-2020-16845
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| gcc-c++ |
CVE-2020-24553 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://groups.google.com/forum/#%21topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.cve.org/CVERecord?id=CVE-2020-24553
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| gcc-c++ |
CVE-2020-28362 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
https://www.cve.org/CVERecord?id=CVE-2020-28362
|
| gcc-c++ |
CVE-2020-28366 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://go.dev/cl/269658
https://go.dev/issue/42559
https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://pkg.go.dev/vuln/GO-2022-0475
https://www.cve.org/CVERecord?id=CVE-2020-28366
|
| gcc-c++ |
CVE-2020-28367 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://go.dev/cl/267277
https://go.dev/issue/42556
https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://pkg.go.dev/vuln/GO-2022-0476
https://www.cve.org/CVERecord?id=CVE-2020-28367
|
| gcc-c++ |
CVE-2021-27918 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
https://security.gentoo.org/glsa/202208-02
https://www.cve.org/CVERecord?id=CVE-2021-27918
|
| gcc-c++ |
CVE-2021-42574 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://bugzilla.redhat.com/show_bug.cgi?id=2005819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574
https://errata.rockylinux.org/RLSA-2021:4585
https://github.com/rust-lang/rust/commit/dd61274930ec0cd17711fab52d2bc9ad3e9053de (1.56.1)
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-42574
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42574
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.openwall.com/lists/oss-security/2021/11/01/1
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.starwindsoftware.com/security/sw-20220804-0002/
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| gcc-c++ |
CVE-2021-42694 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://nvd.nist.gov/vuln/detail/CVE-2021-42694
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42694
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
|
| gcc-c++ |
CVE-2015-5276 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
https://nvd.nist.gov/vuln/detail/CVE-2015-5276
https://www.cve.org/CVERecord?id=CVE-2015-5276
|
| gcc-c++ |
CVE-2016-2226 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://nvd.nist.gov/vuln/detail/CVE-2016-2226
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-2226
https://www.exploit-db.com/exploits/42386/
|
| gcc-c++ |
CVE-2016-4487 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4487
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4487
|
| gcc-c++ |
CVE-2016-4488 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4488
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4488
|
| gcc-c++ |
CVE-2016-4489 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://nvd.nist.gov/vuln/detail/CVE-2016-4489
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4489
|
| gcc-c++ |
CVE-2016-4490 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://nvd.nist.gov/vuln/detail/CVE-2016-4490
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4490
|
| gcc-c++ |
CVE-2016-4491 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4491
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4491
|
| gcc-c++ |
CVE-2016-4492 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=03ef0c6c55ab81002abef62cec430d0496c3a01c
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4492
|
| gcc-c++ |
CVE-2016-4493 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4493
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4493
|
| gcc-c++ |
CVE-2018-20657 |
LOW |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20657
https://support.f5.com/csp/article/K62602089
https://www.cve.org/CVERecord?id=CVE-2018-20657
|
| gcc-c++ |
CVE-2019-14250 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-14250
|
| gcc-c++ |
CVE-2021-3826 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6372
https://access.redhat.com/security/cve/CVE-2021-3826
https://bugzilla.redhat.com/2122627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
https://errata.almalinux.org/9/ALSA-2023-6372.html
https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987
https://linux.oracle.com/cve/CVE-2021-3826.html
https://linux.oracle.com/errata/ELSA-2023-6372.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2021-3826
https://www.cve.org/CVERecord?id=CVE-2021-3826
|
| gcc-c++ |
CVE-2021-46195 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8415
https://access.redhat.com/security/cve/CVE-2021-46195
https://bugzilla.redhat.com/2046300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195
https://errata.almalinux.org/9/ALSA-2022-8415.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=f10bec5ffa487ad3033ed5f38cfd0fc7d696deab
https://linux.oracle.com/cve/CVE-2021-46195.html
https://linux.oracle.com/errata/ELSA-2022-8415.html
https://nvd.nist.gov/vuln/detail/CVE-2021-46195
https://www.cve.org/CVERecord?id=CVE-2021-46195
|
| gcc-c++ |
CVE-2022-27943 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-27943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
|
| gdb |
CVE-2019-1010180 |
MEDIUM |
7.6.1-120.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00029.html
http://www.securityfocus.com/bid/109367
https://access.redhat.com/security/cve/CVE-2019-1010180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010180
https://linux.oracle.com/cve/CVE-2019-1010180.html
https://linux.oracle.com/errata/ELSA-2020-1635.html
https://nvd.nist.gov/vuln/detail/CVE-2019-1010180
https://security.gentoo.org/glsa/202003-31
https://sourceware.org/bugzilla/show_bug.cgi?id=23657
https://www.cve.org/CVERecord?id=CVE-2019-1010180
|
| gdb |
CVE-2022-4285 |
MEDIUM |
7.6.1-120.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6593
https://access.redhat.com/security/cve/CVE-2022-4285
https://bugzilla.redhat.com/2150768
https://bugzilla.redhat.com/show_bug.cgi?id=2150768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4285
https://errata.almalinux.org/9/ALSA-2023-6593.html
https://errata.rockylinux.org/RLSA-2023:6236
https://linux.oracle.com/cve/CVE-2022-4285.html
https://linux.oracle.com/errata/ELSA-2023-6593.html
https://nvd.nist.gov/vuln/detail/CVE-2022-4285
https://security.gentoo.org/glsa/202309-15
https://sourceware.org/bugzilla/show_bug.cgi?id=29699
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=5c831a3c7f3ca98d6aba1200353311e1a1f84c70
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5c831a3c7f3ca98d6aba1200353311e1a1f84c70
https://ubuntu.com/security/notices/USN-6544-1
https://www.cve.org/CVERecord?id=CVE-2022-4285
|
| gdb |
CVE-2023-1579 |
MEDIUM |
7.6.1-120.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-1579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1579
https://nvd.nist.gov/vuln/detail/CVE-2023-1579
https://security.gentoo.org/glsa/202309-15
https://security.netapp.com/advisory/ntap-20230511-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=29988
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8
https://ubuntu.com/security/notices/USN-6101-1
https://www.cve.org/CVERecord?id=CVE-2023-1579
|
| gdb |
CVE-2016-2226 |
LOW |
7.6.1-120.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://nvd.nist.gov/vuln/detail/CVE-2016-2226
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-2226
https://www.exploit-db.com/exploits/42386/
|
| gdb |
CVE-2016-4487 |
LOW |
7.6.1-120.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4487
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4487
|
| gdb |
CVE-2016-4488 |
LOW |
7.6.1-120.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4488
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4488
|
| gdb |
CVE-2016-4489 |
LOW |
7.6.1-120.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://nvd.nist.gov/vuln/detail/CVE-2016-4489
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4489
|
| gdb |
CVE-2016-4490 |
LOW |
7.6.1-120.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://nvd.nist.gov/vuln/detail/CVE-2016-4490
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4490
|
| gdb |
CVE-2016-4491 |
LOW |
7.6.1-120.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4491
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4491
|
| gdb |
CVE-2016-4492 |
LOW |
7.6.1-120.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=03ef0c6c55ab81002abef62cec430d0496c3a01c
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4492
|
| gdb |
CVE-2016-4493 |
LOW |
7.6.1-120.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4493
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4493
|
| gdb |
CVE-2017-9778 |
LOW |
7.6.1-120.el7 |
|
http://www.securityfocus.com/bid/99244
https://access.redhat.com/security/cve/CVE-2017-9778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9778
https://nvd.nist.gov/vuln/detail/CVE-2017-9778
https://sourceware.org/bugzilla/show_bug.cgi?id=21600
https://www.cve.org/CVERecord?id=CVE-2017-9778
|
| gdb |
CVE-2018-20657 |
LOW |
7.6.1-120.el7 |
|
http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20657
https://support.f5.com/csp/article/K62602089
https://www.cve.org/CVERecord?id=CVE-2018-20657
|
| gdb |
CVE-2021-3826 |
LOW |
7.6.1-120.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6372
https://access.redhat.com/security/cve/CVE-2021-3826
https://bugzilla.redhat.com/2122627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
https://errata.almalinux.org/9/ALSA-2023-6372.html
https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987
https://linux.oracle.com/cve/CVE-2021-3826.html
https://linux.oracle.com/errata/ELSA-2023-6372.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2021-3826
https://www.cve.org/CVERecord?id=CVE-2021-3826
|
| gdb |
CVE-2022-44840 |
LOW |
7.6.1-120.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-44840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44840
https://nvd.nist.gov/vuln/detail/CVE-2022-44840
https://sourceware.org/bugzilla/show_bug.cgi?id=29732
https://ubuntu.com/security/notices/USN-6381-1
https://ubuntu.com/security/notices/USN-6581-1
https://www.cve.org/CVERecord?id=CVE-2022-44840
|
| gdb |
CVE-2022-47007 |
LOW |
7.6.1-120.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-47007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47007
https://nvd.nist.gov/vuln/detail/CVE-2022-47007
https://sourceware.org/bugzilla/show_bug.cgi?id=29254
https://ubuntu.com/security/notices/USN-6413-1
https://ubuntu.com/security/notices/USN-6581-1
https://www.cve.org/CVERecord?id=CVE-2022-47007
|
| gdb |
CVE-2022-47008 |
LOW |
7.6.1-120.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-47008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47008
https://nvd.nist.gov/vuln/detail/CVE-2022-47008
https://sourceware.org/bugzilla/show_bug.cgi?id=29255%20
https://ubuntu.com/security/notices/USN-6413-1
https://ubuntu.com/security/notices/USN-6581-1
https://www.cve.org/CVERecord?id=CVE-2022-47008
|
| gdb |
CVE-2022-47010 |
LOW |
7.6.1-120.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-47010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47010
https://nvd.nist.gov/vuln/detail/CVE-2022-47010
https://sourceware.org/bugzilla/show_bug.cgi?id=29262
https://ubuntu.com/security/notices/USN-6413-1
https://ubuntu.com/security/notices/USN-6581-1
https://www.cve.org/CVERecord?id=CVE-2022-47010
|
| gdb |
CVE-2022-47011 |
LOW |
7.6.1-120.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-47011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47011
https://nvd.nist.gov/vuln/detail/CVE-2022-47011
https://sourceware.org/bugzilla/show_bug.cgi?id=29261
https://ubuntu.com/security/notices/USN-6413-1
https://ubuntu.com/security/notices/USN-6581-1
https://www.cve.org/CVERecord?id=CVE-2022-47011
|
| giflib |
CVE-2015-7555 |
MEDIUM |
4.1.6-9.el7 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174876.html
http://packetstormsecurity.com/files/135034/giflib-5.1.1-Heap-Overflow.html
http://seclists.org/fulldisclosure/2015/Dec/83
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023474
http://www.securityfocus.com/archive/1/537171/100/0/threaded
http://www.securityfocus.com/bid/81697
http://www.securitytracker.com/id/1035331
https://access.redhat.com/security/cve/CVE-2015-7555
https://nvd.nist.gov/vuln/detail/CVE-2015-7555
https://source.android.com/security/bulletin/2017-05-01
https://www.cve.org/CVERecord?id=CVE-2015-7555
|
| giflib |
CVE-2022-28506 |
MEDIUM |
4.1.6-9.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-28506
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28506
https://github.com/verf1sh/Poc/blob/master/asan_report_giflib.png
https://github.com/verf1sh/Poc/blob/master/giflib_poc
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4CJSHXBD2RS5OJNWSHQZVMTQCCTIPYS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEAFUZXOOJJVFYRQM6IIJ7LMLEKCCESG/
https://nvd.nist.gov/vuln/detail/CVE-2022-28506
https://sourceforge.net/p/giflib/bugs/159/
https://www.cve.org/CVERecord?id=CVE-2022-28506
|
| giflib |
CVE-2023-48161 |
MEDIUM |
4.1.6-9.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-48161
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48161
https://github.com/tacetool/TACE#cve-2023-48161
https://nvd.nist.gov/vuln/detail/CVE-2023-48161
https://sourceforge.net/p/giflib/bugs/167/
https://www.cve.org/CVERecord?id=CVE-2023-48161
|
| giflib |
CVE-2016-3977 |
LOW |
4.1.6-9.el7 |
|
http://bugs.fi/fuzzing/index.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00079.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00084.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00019.html
http://www.securityfocus.com/bid/88103
https://access.redhat.com/security/cve/CVE-2016-3977
https://bugzilla.redhat.com/show_bug.cgi?id=1325771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3977
https://nvd.nist.gov/vuln/detail/CVE-2016-3977
https://sourceforge.net/p/giflib/bugs/87/
https://sourceforge.net/p/giflib/code/ci/ea8dbc5786862a3e16a5acfa3d24e2c2f608cd88/
https://ubuntu.com/security/notices/USN-4107-1
https://usn.ubuntu.com/4107-1/
https://www.cve.org/CVERecord?id=CVE-2016-3977
|
| giflib |
CVE-2020-23922 |
LOW |
4.1.6-9.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-23922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23922
https://cwe.mitre.org/data/definitions/126.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-23922
https://sourceforge.net/p/giflib/bugs/151/
https://www.cve.org/CVERecord?id=CVE-2020-23922
|
| giflib |
CVE-2023-39742 |
LOW |
4.1.6-9.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-39742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39742
https://gist.github.com/huanglei3/ec9090096aa92445cf0a8baa8e929084
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O4RLSFGPBPR3FMIUJCWPGVIYIU35YGQX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPNBOB65TEA4ZEPLVENI26BY4LEX7TEF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5WO6WL2TCGO6T4VKGACDIVSZI74WJAU/
https://nvd.nist.gov/vuln/detail/CVE-2023-39742
https://sourceforge.net/p/giflib/bugs/166/
https://www.cve.org/CVERecord?id=CVE-2023-39742
|
| glib2 |
CVE-2015-2327 |
MEDIUM |
2.56.1-9.el7_9 |
|
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www.fortiguard.com/advisory/FG-VD-15-010/
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/74924
https://access.redhat.com/security/cve/CVE-2015-2327
https://bugs.exim.org/show_bug.cgi?id=1503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327
https://jira.mongodb.org/browse/SERVER-17252
https://nvd.nist.gov/vuln/detail/CVE-2015-2327
https://ubuntu.com/security/notices/USN-2943-1
https://www.cve.org/CVERecord?id=CVE-2015-2327
|
| glib2 |
CVE-2015-2328 |
MEDIUM |
2.56.1-9.el7_9 |
|
http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.fortiguard.com/advisory/FG-VD-15-014/
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/74924
https://access.redhat.com/security/cve/CVE-2015-2328
https://bugs.exim.org/show_bug.cgi?id=1515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328
https://jira.mongodb.org/browse/SERVER-17252
https://linux.oracle.com/cve/CVE-2015-2328.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://nvd.nist.gov/vuln/detail/CVE-2015-2328
https://ubuntu.com/security/notices/USN-2943-1
https://www.cve.org/CVERecord?id=CVE-2015-2328
|
| glib2 |
CVE-2015-3217 |
MEDIUM |
2.56.1-9.el7_9 |
|
http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre?view=revision&revision=1566
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/06/03/7
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/75018
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-3217
https://bugs.exim.org/show_bug.cgi?id=1638
https://bugzilla.redhat.com/show_bug.cgi?id=1228283
https://linux.oracle.com/cve/CVE-2015-3217.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://nvd.nist.gov/vuln/detail/CVE-2015-3217
https://www.cve.org/CVERecord?id=CVE-2015-3217
|
| glib2 |
CVE-2015-5073 |
MEDIUM |
2.56.1-9.el7_9 |
|
http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?revision=1609&view=markup
http://vcs.pcre.org/pcre?view=revision&revision=1571
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/06/26/1
http://www.openwall.com/lists/oss-security/2015/06/26/3
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/75430
http://www.securitytracker.com/id/1033154
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-5073
https://bugs.exim.org/show_bug.cgi?id=1651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073
https://linux.oracle.com/cve/CVE-2015-5073.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://nvd.nist.gov/vuln/detail/CVE-2015-5073
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2694-1
https://ubuntu.com/security/notices/USN-2943-1
https://www.cve.org/CVERecord?id=CVE-2015-5073
|
| glib2 |
CVE-2015-8388 |
MEDIUM |
2.56.1-9.el7_9 |
|
http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/85576
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8388
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388
https://linux.oracle.com/cve/CVE-2015-8388.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://nvd.nist.gov/vuln/detail/CVE-2015-8388
https://security.gentoo.org/glsa/201607-02
https://ubuntu.com/security/notices/USN-2943-1
https://www.cve.org/CVERecord?id=CVE-2015-8388
|
| glib2 |
CVE-2015-8391 |
MEDIUM |
2.56.1-9.el7_9 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/82990
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8391
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://linux.oracle.com/cve/CVE-2015-8391.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://nvd.nist.gov/vuln/detail/CVE-2015-8391
https://security.gentoo.org/glsa/201607-02
https://security.netapp.com/advisory/ntap-20230216-0002/
https://ubuntu.com/security/notices/USN-2943-1
https://www.cve.org/CVERecord?id=CVE-2015-8391
|
| glib2 |
CVE-2021-27218 |
MEDIUM |
2.56.1-9.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27218.json
https://access.redhat.com/security/cve/CVE-2021-27218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942
https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944
https://linux.oracle.com/cve/CVE-2021-27218.html
https://linux.oracle.com/errata/ELSA-2021-3058.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
https://nvd.nist.gov/vuln/detail/CVE-2021-27218
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210319-0004/
https://ubuntu.com/security/notices/USN-4759-1
https://www.cve.org/CVERecord?id=CVE-2021-27218
|
| glib2 |
CVE-2021-3800 |
MEDIUM |
2.56.1-9.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-3800
https://bugzilla.redhat.com/show_bug.cgi?id=1938284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800
https://gitlab.gnome.org/GNOME/glib/-/commit/3529bb4450a51995
https://linux.oracle.com/cve/CVE-2021-3800.html
https://linux.oracle.com/errata/ELSA-2021-4385.html
https://lists.debian.org/debian-lts-announce/2022/09/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3800
https://security.netapp.com/advisory/ntap-20221028-0004/
https://ubuntu.com/security/notices/USN-5189-1
https://www.cve.org/CVERecord?id=CVE-2021-3800
https://www.openwall.com/lists/oss-security/2017/06/23/8
|
| glib2 |
CVE-2015-8386 |
LOW |
2.56.1-9.el7_9 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html
http://rhn.redhat.com/errata/RHSA-2016-1025.html
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/82990
https://access.redhat.com/errata/RHSA-2016:1132
https://access.redhat.com/security/cve/CVE-2015-8386
https://bto.bluecoat.com/security-advisory/sa128
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://linux.oracle.com/cve/CVE-2015-8386.html
https://linux.oracle.com/errata/ELSA-2016-1025.html
https://nvd.nist.gov/vuln/detail/CVE-2015-8386
https://security.gentoo.org/glsa/201607-02
https://security.netapp.com/advisory/ntap-20230216-0002/
https://ubuntu.com/security/notices/USN-2943-1
https://www.cve.org/CVERecord?id=CVE-2015-8386
|
| glib2 |
CVE-2017-11164 |
LOW |
2.56.1-9.el7_9 |
|
http://openwall.com/lists/oss-security/2017/07/11/3
http://www.openwall.com/lists/oss-security/2023/04/11/1
http://www.openwall.com/lists/oss-security/2023/04/12/1
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-11164
https://www.cve.org/CVERecord?id=CVE-2017-11164
|
| glib2 |
CVE-2017-7244 |
LOW |
2.56.1-9.el7_9 |
|
http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7244
https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244
https://nvd.nist.gov/vuln/detail/CVE-2017-7244
https://security.gentoo.org/glsa/201710-25
https://www.cve.org/CVERecord?id=CVE-2017-7244
|
| glib2 |
CVE-2017-7245 |
LOW |
2.56.1-9.el7_9 |
|
http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://nvd.nist.gov/vuln/detail/CVE-2017-7245
https://security.gentoo.org/glsa/201710-25
https://www.cve.org/CVERecord?id=CVE-2017-7245
|
| glib2 |
CVE-2017-7246 |
LOW |
2.56.1-9.el7_9 |
|
http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://nvd.nist.gov/vuln/detail/CVE-2017-7246
https://security.gentoo.org/glsa/201710-25
https://www.cve.org/CVERecord?id=CVE-2017-7246
|
| glib2 |
CVE-2018-16429 |
LOW |
2.56.1-9.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2018-16429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16429
https://gitlab.gnome.org/GNOME/glib/commit/cec71705406f0b2790422f0c1aa0ff3b4b464b1b
https://gitlab.gnome.org/GNOME/glib/issues/1361
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2018-16429
https://ubuntu.com/security/notices/USN-3767-1
https://ubuntu.com/security/notices/USN-3767-2
https://usn.ubuntu.com/3767-1/
https://usn.ubuntu.com/3767-2/
https://www.cve.org/CVERecord?id=CVE-2018-16429
|
| glib2 |
CVE-2019-13012 |
LOW |
2.56.1-9.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00022.html
https://access.redhat.com/security/cve/CVE-2019-13012
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931234#12
https://bugzilla.redhat.com/show_bug.cgi?id=1152037
https://bugzilla.redhat.com/show_bug.cgi?id=1464902
https://bugzilla.redhat.com/show_bug.cgi?id=1671761
https://bugzilla.redhat.com/show_bug.cgi?id=1700002
https://bugzilla.redhat.com/show_bug.cgi?id=1705392
https://bugzilla.redhat.com/show_bug.cgi?id=1728632
https://bugzilla.redhat.com/show_bug.cgi?id=1728896
https://bugzilla.redhat.com/show_bug.cgi?id=1765627
https://bugzilla.redhat.com/show_bug.cgi?id=1786496
https://bugzilla.redhat.com/show_bug.cgi?id=1796916
https://bugzilla.redhat.com/show_bug.cgi?id=1802105
https://bugzilla.redhat.com/show_bug.cgi?id=1833787
https://bugzilla.redhat.com/show_bug.cgi?id=1842229
https://bugzilla.redhat.com/show_bug.cgi?id=1845660
https://bugzilla.redhat.com/show_bug.cgi?id=1846376
https://bugzilla.redhat.com/show_bug.cgi?id=1854290
https://bugzilla.redhat.com/show_bug.cgi?id=1860946
https://bugzilla.redhat.com/show_bug.cgi?id=1861357
https://bugzilla.redhat.com/show_bug.cgi?id=1861769
https://bugzilla.redhat.com/show_bug.cgi?id=1865718
https://bugzilla.redhat.com/show_bug.cgi?id=1870837
https://bugzilla.redhat.com/show_bug.cgi?id=1871041
https://bugzilla.redhat.com/show_bug.cgi?id=1876291
https://bugzilla.redhat.com/show_bug.cgi?id=1881312
https://bugzilla.redhat.com/show_bug.cgi?id=1883304
https://bugzilla.redhat.com/show_bug.cgi?id=1883868
https://bugzilla.redhat.com/show_bug.cgi?id=1886822
https://bugzilla.redhat.com/show_bug.cgi?id=1888407
https://bugzilla.redhat.com/show_bug.cgi?id=1889411
https://bugzilla.redhat.com/show_bug.cgi?id=1889528
https://bugzilla.redhat.com/show_bug.cgi?id=1901212
https://bugzilla.redhat.com/show_bug.cgi?id=1901214
https://bugzilla.redhat.com/show_bug.cgi?id=1901216
https://bugzilla.redhat.com/show_bug.cgi?id=1901221
https://bugzilla.redhat.com/show_bug.cgi?id=1903043
https://bugzilla.redhat.com/show_bug.cgi?id=1903568
https://bugzilla.redhat.com/show_bug.cgi?id=1906499
https://bugzilla.redhat.com/show_bug.cgi?id=1918391
https://bugzilla.redhat.com/show_bug.cgi?id=1919429
https://bugzilla.redhat.com/show_bug.cgi?id=1919432
https://bugzilla.redhat.com/show_bug.cgi?id=1919435
https://bugzilla.redhat.com/show_bug.cgi?id=1919467
https://bugzilla.redhat.com/show_bug.cgi?id=1921151
https://bugzilla.redhat.com/show_bug.cgi?id=837035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
https://errata.almalinux.org/8/ALSA-2021-1586.html
https://errata.rockylinux.org/RLSA-2021:1586
https://gitlab.gnome.org/GNOME/glib/commit/5e4da714f00f6bfb2ccd6d73d61329c6f3a08429
https://gitlab.gnome.org/GNOME/glib/issues/1658
https://gitlab.gnome.org/GNOME/glib/merge_requests/450
https://linux.oracle.com/cve/CVE-2019-13012.html
https://linux.oracle.com/errata/ELSA-2021-1586.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2019-13012
https://security.netapp.com/advisory/ntap-20190806-0003/
https://ubuntu.com/security/notices/USN-4049-1
https://ubuntu.com/security/notices/USN-4049-2
https://ubuntu.com/security/notices/USN-4049-3
https://ubuntu.com/security/notices/USN-4049-4
https://usn.ubuntu.com/4049-1/
https://usn.ubuntu.com/4049-2/
https://www.cve.org/CVERecord?id=CVE-2019-13012
|
| glib2 |
CVE-2021-28153 |
LOW |
2.56.1-9.el7_9 |
|
https://access.redhat.com/errata/RHSA-2022:8418
https://access.redhat.com/security/cve/CVE-2021-28153
https://bugzilla.redhat.com/1938291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153
https://errata.almalinux.org/9/ALSA-2022-8418.html
https://gitlab.gnome.org/GNOME/glib/-/issues/2325
https://linux.oracle.com/cve/CVE-2021-28153.html
https://linux.oracle.com/errata/ELSA-2022-8418.html
https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-28153
https://security.gentoo.org/glsa/202107-13
https://security.netapp.com/advisory/ntap-20210416-0003/
https://ubuntu.com/security/notices/USN-4764-1
https://www.cve.org/CVERecord?id=CVE-2021-28153
|
| glib2 |
CVE-2023-29499 |
LOW |
2.56.1-9.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:6631
https://access.redhat.com/security/cve/CVE-2023-29499
https://bugzilla.redhat.com/2211827
https://bugzilla.redhat.com/2211828
https://bugzilla.redhat.com/2211829
https://bugzilla.redhat.com/show_bug.cgi?id=2211828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29499
https://errata.almalinux.org/9/ALSA-2023-6631.html
https://gitlab.gnome.org/GNOME/glib/-/issues/2794
https://linux.oracle.com/cve/CVE-2023-29499.html
https://linux.oracle.com/errata/ELSA-2023-6631.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html
https://nvd.nist.gov/vuln/detail/CVE-2023-29499
https://security.gentoo.org/glsa/202311-18
https://security.netapp.com/advisory/ntap-20231103-0001/
https://ubuntu.com/security/notices/USN-6165-1
https://ubuntu.com/security/notices/USN-6165-2
https://www.cve.org/CVERecord?id=CVE-2023-29499
|
| glib2 |
CVE-2023-32611 |
LOW |
2.56.1-9.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:6631
https://access.redhat.com/security/cve/CVE-2023-32611
https://bugzilla.redhat.com/2211827
https://bugzilla.redhat.com/2211828
https://bugzilla.redhat.com/2211829
https://bugzilla.redhat.com/show_bug.cgi?id=2211829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32611
https://errata.almalinux.org/9/ALSA-2023-6631.html
https://gitlab.gnome.org/GNOME/glib/-/issues/2797
https://linux.oracle.com/cve/CVE-2023-32611.html
https://linux.oracle.com/errata/ELSA-2023-6631.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html
https://nvd.nist.gov/vuln/detail/CVE-2023-32611
https://security.gentoo.org/glsa/202311-18
https://security.netapp.com/advisory/ntap-20231027-0005/
https://ubuntu.com/security/notices/USN-6165-1
https://ubuntu.com/security/notices/USN-6165-2
https://www.cve.org/CVERecord?id=CVE-2023-32611
|
| glib2 |
CVE-2023-32636 |
LOW |
2.56.1-9.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-32636
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32636
https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835
https://gitlab.gnome.org/GNOME/glib/-/issues/2841
https://https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835
https://nvd.nist.gov/vuln/detail/CVE-2023-32636
https://security.netapp.com/advisory/ntap-20231110-0002/
https://ubuntu.com/security/notices/USN-6165-1
https://ubuntu.com/security/notices/USN-6165-2
https://www.cve.org/CVERecord?id=CVE-2023-32636
|
| glib2 |
CVE-2023-32665 |
LOW |
2.56.1-9.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:6631
https://access.redhat.com/security/cve/CVE-2023-32665
https://bugzilla.redhat.com/2211827
https://bugzilla.redhat.com/2211828
https://bugzilla.redhat.com/2211829
https://bugzilla.redhat.com/show_bug.cgi?id=2211827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32665
https://errata.almalinux.org/9/ALSA-2023-6631.html
https://gitlab.gnome.org/GNOME/glib/-/issues/2121
https://linux.oracle.com/cve/CVE-2023-32665.html
https://linux.oracle.com/errata/ELSA-2023-6631.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html
https://nvd.nist.gov/vuln/detail/CVE-2023-32665
https://security.gentoo.org/glsa/202311-18
https://ubuntu.com/security/notices/USN-6165-1
https://ubuntu.com/security/notices/USN-6165-2
https://www.cve.org/CVERecord?id=CVE-2023-32665
|
| glibc |
CVE-2009-5155 |
MEDIUM |
2.17-326.el7_9 |
|
http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2009-5155
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
https://www.cve.org/CVERecord?id=CVE-2009-5155
|
| glibc |
CVE-2015-8983 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://nvd.nist.gov/vuln/detail/CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2015-8983
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc |
CVE-2016-1234 |
MEDIUM |
2.17-326.el7_9 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-1234
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2016-1234
|
| glibc |
CVE-2016-4429 |
MEDIUM |
2.17-326.el7_9 |
|
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4429
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
https://www.cve.org/CVERecord?id=CVE-2016-4429
https://www.oracle.com//security-alerts/cpujul2021.html
|
| glibc |
CVE-2017-8804 |
MEDIUM |
2.17-326.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
http://www.openwall.com/lists/oss-security/2017/05/05/2
http://www.securityfocus.com/bid/98339
https://access.redhat.com/security/cve/CVE-2017-8804
https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
https://nvd.nist.gov/vuln/detail/CVE-2017-8804
https://seclists.org/oss-sec/2017/q2/228
https://sourceware.org/bugzilla/show_bug.cgi?id=21461
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
https://www.cve.org/CVERecord?id=CVE-2017-8804
|
| glibc |
CVE-2019-9169 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.cve.org/CVERecord?id=CVE-2019-9169
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc |
CVE-2020-1752 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.cve.org/CVERecord?id=CVE-2020-1752
|
| glibc |
CVE-2021-35942 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.gentoo.org/glsa/202208-24
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5699-1
https://www.cve.org/CVERecord?id=CVE-2021-35942
|
| glibc |
CVE-2021-3999 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://bugzilla.redhat.com/show_bug.cgi?id=2024637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3999
https://security-tracker.debian.org/tracker/CVE-2021-3999
https://security.netapp.com/advisory/ntap-20221104-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=28769
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.cve.org/CVERecord?id=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
|
| glibc |
CVE-2022-23218 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://security.gentoo.org/glsa/202208-24
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.cve.org/CVERecord?id=CVE-2022-23218
https://www.oracle.com/security-alerts/cpujul2022.html
|
| glibc |
CVE-2022-23219 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://security.gentoo.org/glsa/202208-24
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.cve.org/CVERecord?id=CVE-2022-23219
https://www.oracle.com/security-alerts/cpujul2022.html
|
| glibc |
CVE-2023-4806 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/03/4
http://www.openwall.com/lists/oss-security/2023/10/03/5
http://www.openwall.com/lists/oss-security/2023/10/03/6
http://www.openwall.com/lists/oss-security/2023/10/03/8
https://access.redhat.com/errata/RHSA-2023:5453
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/errata/RHSA-2023:7409
https://access.redhat.com/security/cve/CVE-2023-4806
https://bugzilla.redhat.com/2234712
https://bugzilla.redhat.com/2237782
https://bugzilla.redhat.com/2237798
https://bugzilla.redhat.com/2238352
https://bugzilla.redhat.com/show_bug.cgi?id=2234712
https://bugzilla.redhat.com/show_bug.cgi?id=2237782
https://bugzilla.redhat.com/show_bug.cgi?id=2237798
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911
https://errata.almalinux.org/9/ALSA-2023-5453.html
https://errata.rockylinux.org/RLSA-2023:5455
https://linux.oracle.com/cve/CVE-2023-4806.html
https://linux.oracle.com/errata/ELSA-2023-5455.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/
https://nvd.nist.gov/vuln/detail/CVE-2023-4806
https://security.gentoo.org/glsa/202310-03
https://security.netapp.com/advisory/ntap-20240125-0008/
https://ubuntu.com/security/notices/USN-6541-1
https://ubuntu.com/security/notices/USN-6541-2
https://www.cve.org/CVERecord?id=CVE-2023-4806
|
| glibc |
CVE-2023-4813 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/03/8
https://access.redhat.com/errata/RHSA-2023:5453
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/errata/RHSA-2023:7409
https://access.redhat.com/security/cve/CVE-2023-4813
https://bugzilla.redhat.com/2234712
https://bugzilla.redhat.com/2237782
https://bugzilla.redhat.com/2237798
https://bugzilla.redhat.com/2238352
https://bugzilla.redhat.com/show_bug.cgi?id=2234712
https://bugzilla.redhat.com/show_bug.cgi?id=2237782
https://bugzilla.redhat.com/show_bug.cgi?id=2237798
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911
https://errata.almalinux.org/9/ALSA-2023-5453.html
https://errata.rockylinux.org/RLSA-2023:5455
https://linux.oracle.com/cve/CVE-2023-4813.html
https://linux.oracle.com/errata/ELSA-2023-5455.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4813
https://security.netapp.com/advisory/ntap-20231110-0003/
https://ubuntu.com/security/notices/USN-6541-1
https://ubuntu.com/security/notices/USN-6541-2
https://www.cve.org/CVERecord?id=CVE-2023-4813
|
| glibc |
CVE-2023-5156 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/03/4
http://www.openwall.com/lists/oss-security/2023/10/03/5
http://www.openwall.com/lists/oss-security/2023/10/03/6
http://www.openwall.com/lists/oss-security/2023/10/03/8
https://access.redhat.com/security/cve/CVE-2023-5156
https://bugzilla.redhat.com/show_bug.cgi?id=2240541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5156
https://nvd.nist.gov/vuln/detail/CVE-2023-5156
https://security.gentoo.org/glsa/202402-01
https://sourceware.org/bugzilla/show_bug.cgi?id=30884
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796
https://sourceware.org/pipermail/libc-alpha/2023-September/151691.html
https://ubuntu.com/security/notices/USN-6541-1
https://ubuntu.com/security/notices/USN-6541-2
https://www.cve.org/CVERecord?id=CVE-2023-5156
|
| glibc |
CVE-2014-4043 |
LOW |
2.17-326.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
http://www.openwall.com/lists/oss-security/2014/06/13/2
http://www.securityfocus.com/bid/68006
https://access.redhat.com/security/cve/CVE-2014-4043
https://bugzilla.redhat.com/show_bug.cgi?id=1109263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
https://nvd.nist.gov/vuln/detail/CVE-2014-4043
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=17048
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362
https://ubuntu.com/security/notices/USN-2306-1
https://www.cve.org/CVERecord?id=CVE-2014-4043
|
| glibc |
CVE-2015-8982 |
LOW |
2.17-326.el7_9 |
|
http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-8982
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2015-8982
|
| glibc |
CVE-2015-8984 |
LOW |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://nvd.nist.gov/vuln/detail/CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2015-8984
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc |
CVE-2015-8985 |
LOW |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://nvd.nist.gov/vuln/detail/CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
https://www.cve.org/CVERecord?id=CVE-2015-8985
|
| glibc |
CVE-2016-10228 |
LOW |
2.17-326.el7_9 |
|
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10228
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5768-1
https://www.cve.org/CVERecord?id=CVE-2016-10228
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc |
CVE-2017-15671 |
LOW |
2.17-326.el7_9 |
|
http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671
https://nvd.nist.gov/vuln/detail/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
https://www.cve.org/CVERecord?id=CVE-2017-15671
|
| glibc |
CVE-2020-27618 |
LOW |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5768-1
https://www.cve.org/CVERecord?id=CVE-2020-27618
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| glibc |
CVE-2021-33574 |
LOW |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
https://www.cve.org/CVERecord?id=CVE-2021-33574
|
| glibc-common |
CVE-2009-5155 |
MEDIUM |
2.17-326.el7_9 |
|
http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2009-5155
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
https://www.cve.org/CVERecord?id=CVE-2009-5155
|
| glibc-common |
CVE-2015-8983 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://nvd.nist.gov/vuln/detail/CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2015-8983
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc-common |
CVE-2016-1234 |
MEDIUM |
2.17-326.el7_9 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-1234
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2016-1234
|
| glibc-common |
CVE-2016-4429 |
MEDIUM |
2.17-326.el7_9 |
|
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4429
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
https://www.cve.org/CVERecord?id=CVE-2016-4429
https://www.oracle.com//security-alerts/cpujul2021.html
|
| glibc-common |
CVE-2017-8804 |
MEDIUM |
2.17-326.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
http://www.openwall.com/lists/oss-security/2017/05/05/2
http://www.securityfocus.com/bid/98339
https://access.redhat.com/security/cve/CVE-2017-8804
https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
https://nvd.nist.gov/vuln/detail/CVE-2017-8804
https://seclists.org/oss-sec/2017/q2/228
https://sourceware.org/bugzilla/show_bug.cgi?id=21461
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
https://www.cve.org/CVERecord?id=CVE-2017-8804
|
| glibc-common |
CVE-2019-9169 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.cve.org/CVERecord?id=CVE-2019-9169
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-common |
CVE-2020-1752 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.cve.org/CVERecord?id=CVE-2020-1752
|
| glibc-common |
CVE-2021-35942 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.gentoo.org/glsa/202208-24
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5699-1
https://www.cve.org/CVERecord?id=CVE-2021-35942
|
| glibc-common |
CVE-2021-3999 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://bugzilla.redhat.com/show_bug.cgi?id=2024637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3999
https://security-tracker.debian.org/tracker/CVE-2021-3999
https://security.netapp.com/advisory/ntap-20221104-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=28769
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.cve.org/CVERecord?id=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
|
| glibc-common |
CVE-2022-23218 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://security.gentoo.org/glsa/202208-24
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.cve.org/CVERecord?id=CVE-2022-23218
https://www.oracle.com/security-alerts/cpujul2022.html
|
| glibc-common |
CVE-2022-23219 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://security.gentoo.org/glsa/202208-24
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.cve.org/CVERecord?id=CVE-2022-23219
https://www.oracle.com/security-alerts/cpujul2022.html
|
| glibc-common |
CVE-2023-4806 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/03/4
http://www.openwall.com/lists/oss-security/2023/10/03/5
http://www.openwall.com/lists/oss-security/2023/10/03/6
http://www.openwall.com/lists/oss-security/2023/10/03/8
https://access.redhat.com/errata/RHSA-2023:5453
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/errata/RHSA-2023:7409
https://access.redhat.com/security/cve/CVE-2023-4806
https://bugzilla.redhat.com/2234712
https://bugzilla.redhat.com/2237782
https://bugzilla.redhat.com/2237798
https://bugzilla.redhat.com/2238352
https://bugzilla.redhat.com/show_bug.cgi?id=2234712
https://bugzilla.redhat.com/show_bug.cgi?id=2237782
https://bugzilla.redhat.com/show_bug.cgi?id=2237798
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911
https://errata.almalinux.org/9/ALSA-2023-5453.html
https://errata.rockylinux.org/RLSA-2023:5455
https://linux.oracle.com/cve/CVE-2023-4806.html
https://linux.oracle.com/errata/ELSA-2023-5455.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/
https://nvd.nist.gov/vuln/detail/CVE-2023-4806
https://security.gentoo.org/glsa/202310-03
https://security.netapp.com/advisory/ntap-20240125-0008/
https://ubuntu.com/security/notices/USN-6541-1
https://ubuntu.com/security/notices/USN-6541-2
https://www.cve.org/CVERecord?id=CVE-2023-4806
|
| glibc-common |
CVE-2023-4813 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/03/8
https://access.redhat.com/errata/RHSA-2023:5453
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/errata/RHSA-2023:7409
https://access.redhat.com/security/cve/CVE-2023-4813
https://bugzilla.redhat.com/2234712
https://bugzilla.redhat.com/2237782
https://bugzilla.redhat.com/2237798
https://bugzilla.redhat.com/2238352
https://bugzilla.redhat.com/show_bug.cgi?id=2234712
https://bugzilla.redhat.com/show_bug.cgi?id=2237782
https://bugzilla.redhat.com/show_bug.cgi?id=2237798
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911
https://errata.almalinux.org/9/ALSA-2023-5453.html
https://errata.rockylinux.org/RLSA-2023:5455
https://linux.oracle.com/cve/CVE-2023-4813.html
https://linux.oracle.com/errata/ELSA-2023-5455.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4813
https://security.netapp.com/advisory/ntap-20231110-0003/
https://ubuntu.com/security/notices/USN-6541-1
https://ubuntu.com/security/notices/USN-6541-2
https://www.cve.org/CVERecord?id=CVE-2023-4813
|
| glibc-common |
CVE-2023-5156 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/03/4
http://www.openwall.com/lists/oss-security/2023/10/03/5
http://www.openwall.com/lists/oss-security/2023/10/03/6
http://www.openwall.com/lists/oss-security/2023/10/03/8
https://access.redhat.com/security/cve/CVE-2023-5156
https://bugzilla.redhat.com/show_bug.cgi?id=2240541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5156
https://nvd.nist.gov/vuln/detail/CVE-2023-5156
https://security.gentoo.org/glsa/202402-01
https://sourceware.org/bugzilla/show_bug.cgi?id=30884
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796
https://sourceware.org/pipermail/libc-alpha/2023-September/151691.html
https://ubuntu.com/security/notices/USN-6541-1
https://ubuntu.com/security/notices/USN-6541-2
https://www.cve.org/CVERecord?id=CVE-2023-5156
|
| glibc-common |
CVE-2014-4043 |
LOW |
2.17-326.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
http://www.openwall.com/lists/oss-security/2014/06/13/2
http://www.securityfocus.com/bid/68006
https://access.redhat.com/security/cve/CVE-2014-4043
https://bugzilla.redhat.com/show_bug.cgi?id=1109263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
https://nvd.nist.gov/vuln/detail/CVE-2014-4043
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=17048
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362
https://ubuntu.com/security/notices/USN-2306-1
https://www.cve.org/CVERecord?id=CVE-2014-4043
|
| glibc-common |
CVE-2015-8982 |
LOW |
2.17-326.el7_9 |
|
http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-8982
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2015-8982
|
| glibc-common |
CVE-2015-8984 |
LOW |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://nvd.nist.gov/vuln/detail/CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2015-8984
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc-common |
CVE-2015-8985 |
LOW |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://nvd.nist.gov/vuln/detail/CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
https://www.cve.org/CVERecord?id=CVE-2015-8985
|
| glibc-common |
CVE-2016-10228 |
LOW |
2.17-326.el7_9 |
|
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10228
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5768-1
https://www.cve.org/CVERecord?id=CVE-2016-10228
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-common |
CVE-2017-15671 |
LOW |
2.17-326.el7_9 |
|
http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671
https://nvd.nist.gov/vuln/detail/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
https://www.cve.org/CVERecord?id=CVE-2017-15671
|
| glibc-common |
CVE-2020-27618 |
LOW |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5768-1
https://www.cve.org/CVERecord?id=CVE-2020-27618
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| glibc-common |
CVE-2021-33574 |
LOW |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
https://www.cve.org/CVERecord?id=CVE-2021-33574
|
| glibc-devel |
CVE-2009-5155 |
MEDIUM |
2.17-326.el7_9 |
|
http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2009-5155
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
https://www.cve.org/CVERecord?id=CVE-2009-5155
|
| glibc-devel |
CVE-2015-8983 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://nvd.nist.gov/vuln/detail/CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2015-8983
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc-devel |
CVE-2016-1234 |
MEDIUM |
2.17-326.el7_9 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-1234
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2016-1234
|
| glibc-devel |
CVE-2016-4429 |
MEDIUM |
2.17-326.el7_9 |
|
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4429
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
https://www.cve.org/CVERecord?id=CVE-2016-4429
https://www.oracle.com//security-alerts/cpujul2021.html
|
| glibc-devel |
CVE-2017-8804 |
MEDIUM |
2.17-326.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
http://www.openwall.com/lists/oss-security/2017/05/05/2
http://www.securityfocus.com/bid/98339
https://access.redhat.com/security/cve/CVE-2017-8804
https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
https://nvd.nist.gov/vuln/detail/CVE-2017-8804
https://seclists.org/oss-sec/2017/q2/228
https://sourceware.org/bugzilla/show_bug.cgi?id=21461
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
https://www.cve.org/CVERecord?id=CVE-2017-8804
|
| glibc-devel |
CVE-2019-9169 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.cve.org/CVERecord?id=CVE-2019-9169
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-devel |
CVE-2020-1752 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.cve.org/CVERecord?id=CVE-2020-1752
|
| glibc-devel |
CVE-2021-35942 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.gentoo.org/glsa/202208-24
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5699-1
https://www.cve.org/CVERecord?id=CVE-2021-35942
|
| glibc-devel |
CVE-2021-3999 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://bugzilla.redhat.com/show_bug.cgi?id=2024637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3999
https://security-tracker.debian.org/tracker/CVE-2021-3999
https://security.netapp.com/advisory/ntap-20221104-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=28769
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.cve.org/CVERecord?id=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
|
| glibc-devel |
CVE-2022-23218 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://security.gentoo.org/glsa/202208-24
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.cve.org/CVERecord?id=CVE-2022-23218
https://www.oracle.com/security-alerts/cpujul2022.html
|
| glibc-devel |
CVE-2022-23219 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://security.gentoo.org/glsa/202208-24
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.cve.org/CVERecord?id=CVE-2022-23219
https://www.oracle.com/security-alerts/cpujul2022.html
|
| glibc-devel |
CVE-2023-4806 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/03/4
http://www.openwall.com/lists/oss-security/2023/10/03/5
http://www.openwall.com/lists/oss-security/2023/10/03/6
http://www.openwall.com/lists/oss-security/2023/10/03/8
https://access.redhat.com/errata/RHSA-2023:5453
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/errata/RHSA-2023:7409
https://access.redhat.com/security/cve/CVE-2023-4806
https://bugzilla.redhat.com/2234712
https://bugzilla.redhat.com/2237782
https://bugzilla.redhat.com/2237798
https://bugzilla.redhat.com/2238352
https://bugzilla.redhat.com/show_bug.cgi?id=2234712
https://bugzilla.redhat.com/show_bug.cgi?id=2237782
https://bugzilla.redhat.com/show_bug.cgi?id=2237798
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911
https://errata.almalinux.org/9/ALSA-2023-5453.html
https://errata.rockylinux.org/RLSA-2023:5455
https://linux.oracle.com/cve/CVE-2023-4806.html
https://linux.oracle.com/errata/ELSA-2023-5455.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/
https://nvd.nist.gov/vuln/detail/CVE-2023-4806
https://security.gentoo.org/glsa/202310-03
https://security.netapp.com/advisory/ntap-20240125-0008/
https://ubuntu.com/security/notices/USN-6541-1
https://ubuntu.com/security/notices/USN-6541-2
https://www.cve.org/CVERecord?id=CVE-2023-4806
|
| glibc-devel |
CVE-2023-4813 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/03/8
https://access.redhat.com/errata/RHSA-2023:5453
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/errata/RHSA-2023:7409
https://access.redhat.com/security/cve/CVE-2023-4813
https://bugzilla.redhat.com/2234712
https://bugzilla.redhat.com/2237782
https://bugzilla.redhat.com/2237798
https://bugzilla.redhat.com/2238352
https://bugzilla.redhat.com/show_bug.cgi?id=2234712
https://bugzilla.redhat.com/show_bug.cgi?id=2237782
https://bugzilla.redhat.com/show_bug.cgi?id=2237798
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911
https://errata.almalinux.org/9/ALSA-2023-5453.html
https://errata.rockylinux.org/RLSA-2023:5455
https://linux.oracle.com/cve/CVE-2023-4813.html
https://linux.oracle.com/errata/ELSA-2023-5455.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4813
https://security.netapp.com/advisory/ntap-20231110-0003/
https://ubuntu.com/security/notices/USN-6541-1
https://ubuntu.com/security/notices/USN-6541-2
https://www.cve.org/CVERecord?id=CVE-2023-4813
|
| glibc-devel |
CVE-2023-5156 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/03/4
http://www.openwall.com/lists/oss-security/2023/10/03/5
http://www.openwall.com/lists/oss-security/2023/10/03/6
http://www.openwall.com/lists/oss-security/2023/10/03/8
https://access.redhat.com/security/cve/CVE-2023-5156
https://bugzilla.redhat.com/show_bug.cgi?id=2240541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5156
https://nvd.nist.gov/vuln/detail/CVE-2023-5156
https://security.gentoo.org/glsa/202402-01
https://sourceware.org/bugzilla/show_bug.cgi?id=30884
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796
https://sourceware.org/pipermail/libc-alpha/2023-September/151691.html
https://ubuntu.com/security/notices/USN-6541-1
https://ubuntu.com/security/notices/USN-6541-2
https://www.cve.org/CVERecord?id=CVE-2023-5156
|
| glibc-devel |
CVE-2014-4043 |
LOW |
2.17-326.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
http://www.openwall.com/lists/oss-security/2014/06/13/2
http://www.securityfocus.com/bid/68006
https://access.redhat.com/security/cve/CVE-2014-4043
https://bugzilla.redhat.com/show_bug.cgi?id=1109263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
https://nvd.nist.gov/vuln/detail/CVE-2014-4043
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=17048
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362
https://ubuntu.com/security/notices/USN-2306-1
https://www.cve.org/CVERecord?id=CVE-2014-4043
|
| glibc-devel |
CVE-2015-8982 |
LOW |
2.17-326.el7_9 |
|
http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-8982
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2015-8982
|
| glibc-devel |
CVE-2015-8984 |
LOW |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://nvd.nist.gov/vuln/detail/CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2015-8984
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc-devel |
CVE-2015-8985 |
LOW |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://nvd.nist.gov/vuln/detail/CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
https://www.cve.org/CVERecord?id=CVE-2015-8985
|
| glibc-devel |
CVE-2016-10228 |
LOW |
2.17-326.el7_9 |
|
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10228
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5768-1
https://www.cve.org/CVERecord?id=CVE-2016-10228
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-devel |
CVE-2017-15671 |
LOW |
2.17-326.el7_9 |
|
http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671
https://nvd.nist.gov/vuln/detail/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
https://www.cve.org/CVERecord?id=CVE-2017-15671
|
| glibc-devel |
CVE-2020-27618 |
LOW |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5768-1
https://www.cve.org/CVERecord?id=CVE-2020-27618
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| glibc-devel |
CVE-2021-33574 |
LOW |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
https://www.cve.org/CVERecord?id=CVE-2021-33574
|
| glibc-headers |
CVE-2009-5155 |
MEDIUM |
2.17-326.el7_9 |
|
http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272
https://access.redhat.com/security/cve/CVE-2009-5155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2009-5155
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=11053
https://sourceware.org/bugzilla/show_bug.cgi?id=18986
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672
https://support.f5.com/csp/article/K64119434
https://support.f5.com/csp/article/K64119434?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4954-1
https://www.cve.org/CVERecord?id=CVE-2009-5155
|
| glibc-headers |
CVE-2015-8983 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2015/02/22/15
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72740
https://access.redhat.com/security/cve/CVE-2015-8983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983
https://nvd.nist.gov/vuln/detail/CVE-2015-8983
https://sourceware.org/bugzilla/show_bug.cgi?id=17269
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2015-8983
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc-headers |
CVE-2016-1234 |
MEDIUM |
2.17-326.el7_9 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
http://seclists.org/fulldisclosure/2021/Sep/0
http://www.openwall.com/lists/oss-security/2016/03/07/16
http://www.securityfocus.com/bid/84204
https://access.redhat.com/security/cve/CVE-2016-1234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-1234
https://security.gentoo.org/glsa/201702-11
https://sourceware.org/bugzilla/show_bug.cgi?id=19779
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2016-1234
|
| glibc-headers |
CVE-2016-4429 |
MEDIUM |
2.17-326.el7_9 |
|
http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.securityfocus.com/bid/102073
https://access.redhat.com/security/cve/CVE-2016-4429
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4429
https://source.android.com/security/bulletin/2017-12-01
https://sourceware.org/bugzilla/show_bug.cgi?id=20112
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c
https://ubuntu.com/security/notices/USN-3239-1
https://ubuntu.com/security/notices/USN-3759-1
https://ubuntu.com/security/notices/USN-3759-2
https://usn.ubuntu.com/3759-1/
https://usn.ubuntu.com/3759-2/
https://www.cve.org/CVERecord?id=CVE-2016-4429
https://www.oracle.com//security-alerts/cpujul2021.html
|
| glibc-headers |
CVE-2017-8804 |
MEDIUM |
2.17-326.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html
http://www.openwall.com/lists/oss-security/2017/05/05/2
http://www.securityfocus.com/bid/98339
https://access.redhat.com/security/cve/CVE-2017-8804
https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7
https://nvd.nist.gov/vuln/detail/CVE-2017-8804
https://seclists.org/oss-sec/2017/q2/228
https://sourceware.org/bugzilla/show_bug.cgi?id=21461
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html
https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html
https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
https://www.cve.org/CVERecord?id=CVE-2017-8804
|
| glibc-headers |
CVE-2019-9169 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.securityfocus.com/bid/107160
https://access.redhat.com/security/cve/CVE-2019-9169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
https://kc.mcafee.com/corporate/index?page=content&id=SB10278
https://linux.oracle.com/cve/CVE-2019-9169.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://nvd.nist.gov/vuln/detail/CVE-2019-9169
https://security.gentoo.org/glsa/202006-04
https://security.netapp.com/advisory/ntap-20190315-0002/
https://sourceware.org/bugzilla/show_bug.cgi?id=24114
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9
https://support.f5.com/csp/article/K54823184
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.cve.org/CVERecord?id=CVE-2019-9169
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-headers |
CVE-2020-1752 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-1752
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752
https://linux.oracle.com/cve/CVE-2020-1752.html
https://linux.oracle.com/errata/ELSA-2020-4444.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1752
https://security.gentoo.org/glsa/202101-20
https://security.netapp.com/advisory/ntap-20200511-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=25414
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ddc650e9b3dc916eab417ce9f79e67337b05035c
https://ubuntu.com/security/notices/USN-4416-1
https://usn.ubuntu.com/4416-1/
https://www.cve.org/CVERecord?id=CVE-2020-1752
|
| glibc-headers |
CVE-2021-35942 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json
https://access.redhat.com/security/cve/CVE-2021-35942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942
https://linux.oracle.com/cve/CVE-2021-35942.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35942
https://security.gentoo.org/glsa/202208-24
https://security.netapp.com/advisory/ntap-20210827-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=28011
https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c
https://sourceware.org/glibc/wiki/Security%20Exceptions
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5699-1
https://www.cve.org/CVERecord?id=CVE-2021-35942
|
| glibc-headers |
CVE-2021-3999 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json
https://access.redhat.com/security/cve/CVE-2021-3999
https://bugzilla.redhat.com/show_bug.cgi?id=2024637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999
https://linux.oracle.com/cve/CVE-2021-3999.html
https://linux.oracle.com/errata/ELSA-2022-9234.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3999
https://security-tracker.debian.org/tracker/CVE-2021-3999
https://security.netapp.com/advisory/ntap-20221104-0001/
https://sourceware.org/bugzilla/show_bug.cgi?id=28769
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.cve.org/CVERecord?id=CVE-2021-3999
https://www.openwall.com/lists/oss-security/2022/01/24/4
|
| glibc-headers |
CVE-2022-23218 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-23218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218
https://linux.oracle.com/cve/CVE-2022-23218.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23218
https://security.gentoo.org/glsa/202208-24
https://sourceware.org/bugzilla/show_bug.cgi?id=28768
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.cve.org/CVERecord?id=CVE-2022-23218
https://www.oracle.com/security-alerts/cpujul2022.html
|
| glibc-headers |
CVE-2022-23219 |
MEDIUM |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-23219
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219
https://linux.oracle.com/cve/CVE-2022-23219.html
https://linux.oracle.com/errata/ELSA-2022-9421.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23219
https://security.gentoo.org/glsa/202208-24
https://sourceware.org/bugzilla/show_bug.cgi?id=22542
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5310-2
https://www.cve.org/CVERecord?id=CVE-2022-23219
https://www.oracle.com/security-alerts/cpujul2022.html
|
| glibc-headers |
CVE-2023-4806 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/03/4
http://www.openwall.com/lists/oss-security/2023/10/03/5
http://www.openwall.com/lists/oss-security/2023/10/03/6
http://www.openwall.com/lists/oss-security/2023/10/03/8
https://access.redhat.com/errata/RHSA-2023:5453
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/errata/RHSA-2023:7409
https://access.redhat.com/security/cve/CVE-2023-4806
https://bugzilla.redhat.com/2234712
https://bugzilla.redhat.com/2237782
https://bugzilla.redhat.com/2237798
https://bugzilla.redhat.com/2238352
https://bugzilla.redhat.com/show_bug.cgi?id=2234712
https://bugzilla.redhat.com/show_bug.cgi?id=2237782
https://bugzilla.redhat.com/show_bug.cgi?id=2237798
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911
https://errata.almalinux.org/9/ALSA-2023-5453.html
https://errata.rockylinux.org/RLSA-2023:5455
https://linux.oracle.com/cve/CVE-2023-4806.html
https://linux.oracle.com/errata/ELSA-2023-5455.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/
https://nvd.nist.gov/vuln/detail/CVE-2023-4806
https://security.gentoo.org/glsa/202310-03
https://security.netapp.com/advisory/ntap-20240125-0008/
https://ubuntu.com/security/notices/USN-6541-1
https://ubuntu.com/security/notices/USN-6541-2
https://www.cve.org/CVERecord?id=CVE-2023-4806
|
| glibc-headers |
CVE-2023-4813 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/03/8
https://access.redhat.com/errata/RHSA-2023:5453
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/errata/RHSA-2023:7409
https://access.redhat.com/security/cve/CVE-2023-4813
https://bugzilla.redhat.com/2234712
https://bugzilla.redhat.com/2237782
https://bugzilla.redhat.com/2237798
https://bugzilla.redhat.com/2238352
https://bugzilla.redhat.com/show_bug.cgi?id=2234712
https://bugzilla.redhat.com/show_bug.cgi?id=2237782
https://bugzilla.redhat.com/show_bug.cgi?id=2237798
https://bugzilla.redhat.com/show_bug.cgi?id=2238352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911
https://errata.almalinux.org/9/ALSA-2023-5453.html
https://errata.rockylinux.org/RLSA-2023:5455
https://linux.oracle.com/cve/CVE-2023-4813.html
https://linux.oracle.com/errata/ELSA-2023-5455.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4813
https://security.netapp.com/advisory/ntap-20231110-0003/
https://ubuntu.com/security/notices/USN-6541-1
https://ubuntu.com/security/notices/USN-6541-2
https://www.cve.org/CVERecord?id=CVE-2023-4813
|
| glibc-headers |
CVE-2023-5156 |
MEDIUM |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/03/4
http://www.openwall.com/lists/oss-security/2023/10/03/5
http://www.openwall.com/lists/oss-security/2023/10/03/6
http://www.openwall.com/lists/oss-security/2023/10/03/8
https://access.redhat.com/security/cve/CVE-2023-5156
https://bugzilla.redhat.com/show_bug.cgi?id=2240541
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5156
https://nvd.nist.gov/vuln/detail/CVE-2023-5156
https://security.gentoo.org/glsa/202402-01
https://sourceware.org/bugzilla/show_bug.cgi?id=30884
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796
https://sourceware.org/pipermail/libc-alpha/2023-September/151691.html
https://ubuntu.com/security/notices/USN-6541-1
https://ubuntu.com/security/notices/USN-6541-2
https://www.cve.org/CVERecord?id=CVE-2023-5156
|
| glibc-headers |
CVE-2014-4043 |
LOW |
2.17-326.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
http://www.mandriva.com/security/advisories?name=MDVSA-2014:152
http://www.openwall.com/lists/oss-security/2014/06/13/2
http://www.securityfocus.com/bid/68006
https://access.redhat.com/security/cve/CVE-2014-4043
https://bugzilla.redhat.com/show_bug.cgi?id=1109263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043
https://exchange.xforce.ibmcloud.com/vulnerabilities/93784
https://nvd.nist.gov/vuln/detail/CVE-2014-4043
https://seclists.org/bugtraq/2019/Jun/14
https://seclists.org/bugtraq/2019/Sep/7
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=17048
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362
https://ubuntu.com/security/notices/USN-2306-1
https://www.cve.org/CVERecord?id=CVE-2014-4043
|
| glibc-headers |
CVE-2015-8982 |
LOW |
2.17-326.el7_9 |
|
http://openwall.com/lists/oss-security/2015/09/08/2
http://www.openwall.com/lists/oss-security/2015/02/13/3
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72602
https://access.redhat.com/security/cve/CVE-2015-8982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-8982
https://sourceware.org/bugzilla/show_bug.cgi?id=16009
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2015-8982
|
| glibc-headers |
CVE-2015-8984 |
LOW |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2015/02/26/5
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/72789
https://access.redhat.com/security/cve/CVE-2015-8984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984
https://nvd.nist.gov/vuln/detail/CVE-2015-8984
https://sourceware.org/bugzilla/show_bug.cgi?id=18032
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185
https://ubuntu.com/security/notices/USN-3239-1
https://www.cve.org/CVERecord?id=CVE-2015-8984
https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc-headers |
CVE-2015-8985 |
LOW |
2.17-326.el7_9 |
|
http://www.openwall.com/lists/oss-security/2017/02/14/9
http://www.securityfocus.com/bid/76916
https://access.redhat.com/security/cve/CVE-2015-8985
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392
https://nvd.nist.gov/vuln/detail/CVE-2015-8985
https://security.gentoo.org/glsa/201908-06
https://www.cve.org/CVERecord?id=CVE-2015-8985
|
| glibc-headers |
CVE-2016-10228 |
LOW |
2.17-326.el7_9 |
|
http://openwall.com/lists/oss-security/2017/03/01/10
http://www.securityfocus.com/bid/96525
https://access.redhat.com/security/cve/CVE-2016-10228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228
https://linux.oracle.com/cve/CVE-2016-10228.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10228
https://security.gentoo.org/glsa/202101-20
https://sourceware.org/bugzilla/show_bug.cgi?id=19519
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5768-1
https://www.cve.org/CVERecord?id=CVE-2016-10228
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-headers |
CVE-2017-15671 |
LOW |
2.17-326.el7_9 |
|
http://www.securityfocus.com/bid/101517
https://access.redhat.com/security/cve/CVE-2017-15671
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671
https://nvd.nist.gov/vuln/detail/CVE-2017-15671
https://sourceware.org/bugzilla/show_bug.cgi?id=22325
https://www.cve.org/CVERecord?id=CVE-2017-15671
|
| glibc-headers |
CVE-2020-27618 |
LOW |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-27618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618
https://linux.oracle.com/cve/CVE-2020-27618.html
https://linux.oracle.com/errata/ELSA-2021-9344.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27618
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210401-0006/
https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
https://sourceware.org/bugzilla/show_bug.cgi?id=26224
https://ubuntu.com/security/notices/USN-5310-1
https://ubuntu.com/security/notices/USN-5768-1
https://www.cve.org/CVERecord?id=CVE-2020-27618
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| glibc-headers |
CVE-2021-33574 |
LOW |
2.17-326.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-33574
https://linux.oracle.com/cve/CVE-2021-33574.html
https://linux.oracle.com/errata/ELSA-2021-9560.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/
https://nvd.nist.gov/vuln/detail/CVE-2021-33574
https://security.gentoo.org/glsa/202107-07
https://security.netapp.com/advisory/ntap-20210629-0005/
https://sourceware.org/bugzilla/show_bug.cgi?id=27896
https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
https://www.cve.org/CVERecord?id=CVE-2021-33574
|
| gmp |
CVE-2021-43618 |
MEDIUM |
1:6.0.0-15.el7 |
|
http://seclists.org/fulldisclosure/2022/Oct/8
http://www.openwall.com/lists/oss-security/2022/10/13/3
https://access.redhat.com/errata/RHSA-2023:6661
https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://bugzilla.redhat.com/2024904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://errata.almalinux.org/9/ALSA-2023-6661.html
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://linux.oracle.com/cve/CVE-2021-43618.html
https://linux.oracle.com/errata/ELSA-2023-6661.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
https://security.gentoo.org/glsa/202309-13
https://security.netapp.com/advisory/ntap-20221111-0001/
https://ubuntu.com/security/notices/USN-5672-1
https://ubuntu.com/security/notices/USN-5672-2
https://www.cve.org/CVERecord?id=CVE-2021-43618
|
| gmp-devel |
CVE-2021-43618 |
MEDIUM |
1:6.0.0-15.el7 |
|
http://seclists.org/fulldisclosure/2022/Oct/8
http://www.openwall.com/lists/oss-security/2022/10/13/3
https://access.redhat.com/errata/RHSA-2023:6661
https://access.redhat.com/security/cve/CVE-2021-43618
https://bugs.debian.org/994405
https://bugzilla.redhat.com/2024904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618
https://errata.almalinux.org/9/ALSA-2023-6661.html
https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html
https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e
https://linux.oracle.com/cve/CVE-2021-43618.html
https://linux.oracle.com/errata/ELSA-2023-6661.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2021-43618
https://security.gentoo.org/glsa/202309-13
https://security.netapp.com/advisory/ntap-20221111-0001/
https://ubuntu.com/security/notices/USN-5672-1
https://ubuntu.com/security/notices/USN-5672-2
https://www.cve.org/CVERecord?id=CVE-2021-43618
|
| gnupg2 |
CVE-2014-4617 |
MEDIUM |
2.0.22-5.el7_5 |
|
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=014b2103fcb12f261135e3954f26e9e07b39e342
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html
http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000345.html
http://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html
http://secunia.com/advisories/59213
http://secunia.com/advisories/59351
http://secunia.com/advisories/59534
http://secunia.com/advisories/59578
http://www.debian.org/security/2014/dsa-2967
http://www.debian.org/security/2014/dsa-2968
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.ubuntu.com/usn/USN-2258-1
https://access.redhat.com/security/cve/CVE-2014-4617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617
https://nvd.nist.gov/vuln/detail/CVE-2014-4617
https://ubuntu.com/security/notices/USN-2258-1
https://www.cve.org/CVERecord?id=CVE-2014-4617
|
| gnupg2 |
CVE-2019-13050 |
MEDIUM |
2.0.22-5.el7_5 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html
https://access.redhat.com/articles/4264021
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000858.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13050.json
https://access.redhat.com/security/cve/CVE-2019-13050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050
https://errata.almalinux.org/8/ALSA-2020-4490.html
https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f
https://linux.oracle.com/cve/CVE-2019-13050.html
https://linux.oracle.com/errata/ELSA-2020-4490.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/
https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html
https://nvd.nist.gov/vuln/detail/CVE-2019-13050
https://support.f5.com/csp/article/K08654551
https://support.f5.com/csp/article/K08654551?utm_source=f5support&%3Butm_medium=RSS
https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/
https://twitter.com/lambdafu/status/1147162583969009664
https://ubuntu.com/security/notices/USN-5431-1
https://www.cve.org/CVERecord?id=CVE-2019-13050
|
| gnupg2 |
CVE-2022-34903 |
MEDIUM |
2.0.22-5.el7_5 |
|
http://www.openwall.com/lists/oss-security/2022/07/02/1
https://access.redhat.com/errata/RHSA-2022:6602
https://access.redhat.com/security/cve/CVE-2022-34903
https://bugs.debian.org/1014157
https://bugzilla.redhat.com/2102868
https://bugzilla.redhat.com/show_bug.cgi?id=2102868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34903
https://dev.gnupg.org/T6027
https://errata.almalinux.org/9/ALSA-2022-6602.html
https://errata.rockylinux.org/RLSA-2022:6602
https://linux.oracle.com/cve/CVE-2022-34903.html
https://linux.oracle.com/errata/ELSA-2022-6602.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRLWJQ76A4UKHI3Q36BKSJKS4LFLQO33/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPTAR76EIZY7NQFENSOZO7U473257OVZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VN63GBTMRWO36Y7BKA2WQHROAKCXKCBL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VU64FUVG2PRZBSHFOQRSP7KDVEIZ23OS/
https://nvd.nist.gov/vuln/detail/CVE-2022-34903
https://security.netapp.com/advisory/ntap-20220826-0005/
https://ubuntu.com/security/notices/USN-5503-1
https://ubuntu.com/security/notices/USN-5503-2
https://www.cve.org/CVERecord?id=CVE-2022-34903
https://www.debian.org/security/2022/dsa-5174
https://www.openwall.com/lists/oss-security/2022/06/30/1
|
| gnupg2 |
CVE-2014-3591 |
LOW |
2.0.22-5.el7_5 |
|
http://www.cs.tau.ac.il/~tromer/radioexp/
http://www.debian.org/security/2015/dsa-3184
http://www.debian.org/security/2015/dsa-3185
https://access.redhat.com/security/cve/CVE-2014-3591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
https://nvd.nist.gov/vuln/detail/CVE-2014-3591
https://ubuntu.com/security/notices/USN-2554-1
https://ubuntu.com/security/notices/USN-2555-1
https://www.cve.org/CVERecord?id=CVE-2014-3591
|
| gnupg2 |
CVE-2015-0837 |
LOW |
2.0.22-5.el7_5 |
|
http://www.debian.org/security/2015/dsa-3184
http://www.debian.org/security/2015/dsa-3185
https://access.redhat.com/security/cve/CVE-2015-0837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837
https://ieeexplore.ieee.org/document/7163050
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
https://nvd.nist.gov/vuln/detail/CVE-2015-0837
https://ubuntu.com/security/notices/USN-2554-1
https://ubuntu.com/security/notices/USN-2555-1
https://www.cve.org/CVERecord?id=CVE-2015-0837
|
| gnupg2 |
CVE-2015-1606 |
LOW |
2.0.22-5.el7_5 |
|
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648
http://www.debian.org/security/2015/dsa-3184
http://www.openwall.com/lists/oss-security/2015/02/13/14
http://www.openwall.com/lists/oss-security/2015/02/14/6
http://www.securitytracker.com/id/1031876
https://access.redhat.com/security/cve/CVE-2015-1606
https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606
https://nvd.nist.gov/vuln/detail/CVE-2015-1606
https://ubuntu.com/security/notices/USN-2554-1
https://www.cve.org/CVERecord?id=CVE-2015-1606
|
| gnupg2 |
CVE-2015-1607 |
LOW |
2.0.22-5.el7_5 |
|
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commit%3Bh=2183683bd633818dd031b090b5530951de76f392
http://www.openwall.com/lists/oss-security/2015/02/13/14
http://www.openwall.com/lists/oss-security/2015/02/14/6
http://www.securityfocus.com/bid/72610
http://www.ubuntu.com/usn/usn-2554-1/
https://access.redhat.com/security/cve/CVE-2015-1607
https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1607
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000361.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000362.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://nvd.nist.gov/vuln/detail/CVE-2015-1607
https://ubuntu.com/security/notices/USN-2554-1
https://www.cve.org/CVERecord?id=CVE-2015-1607
|
| gnupg2 |
CVE-2018-9234 |
LOW |
2.0.22-5.el7_5 |
|
https://access.redhat.com/security/cve/CVE-2018-9234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234
https://dev.gnupg.org/T3844
https://nvd.nist.gov/vuln/detail/CVE-2018-9234
https://ubuntu.com/security/notices/USN-3675-1
https://usn.ubuntu.com/3675-1/
https://www.cve.org/CVERecord?id=CVE-2018-9234
|
| gnupg2 |
CVE-2022-3219 |
LOW |
2.0.22-5.el7_5 |
|
https://access.redhat.com/security/cve/CVE-2022-3219
https://bugzilla.redhat.com/show_bug.cgi?id=2127010
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3219
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://nvd.nist.gov/vuln/detail/CVE-2022-3219
https://security.netapp.com/advisory/ntap-20230324-0001/
https://www.cve.org/CVERecord?id=CVE-2022-3219
|
| gnutls |
CVE-2014-3566 |
HIGH |
3.3.29-9.el7_6 |
|
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
http://advisories.mageia.org/MGASA-2014-0416.html
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
http://askubuntu.com/a/537196
http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
http://downloads.asterisk.org/pub/security/AST-2014-011.html
http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
http://marc.info/?l=bugtraq&m=141450452204552&w=2
http://marc.info/?l=bugtraq&m=141450973807288&w=2
http://marc.info/?l=bugtraq&m=141477196830952&w=2
http://marc.info/?l=bugtraq&m=141576815022399&w=2
http://marc.info/?l=bugtraq&m=141577087123040&w=2
http://marc.info/?l=bugtraq&m=141577350823734&w=2
http://marc.info/?l=bugtraq&m=141620103726640&w=2
http://marc.info/?l=bugtraq&m=141628688425177&w=2
http://marc.info/?l=bugtraq&m=141694355519663&w=2
http://marc.info/?l=bugtraq&m=141697638231025&w=2
http://marc.info/?l=bugtraq&m=141697676231104&w=2
http://marc.info/?l=bugtraq&m=141703183219781&w=2
http://marc.info/?l=bugtraq&m=141715130023061&w=2
http://marc.info/?l=bugtraq&m=141775427104070&w=2
http://marc.info/?l=bugtraq&m=141813976718456&w=2
http://marc.info/?l=bugtraq&m=141814011518700&w=2
http://marc.info/?l=bugtraq&m=141879378918327&w=2
http://marc.info/?l=bugtraq&m=142103967620673&w=2
http://marc.info/?l=bugtraq&m=142118135300698&w=2
http://marc.info/?l=bugtraq&m=142296755107581&w=2
http://marc.info/?l=bugtraq&m=142350196615714&w=2
http://marc.info/?l=bugtraq&m=142350298616097&w=2
http://marc.info/?l=bugtraq&m=142350743917559&w=2
http://marc.info/?l=bugtraq&m=142354438527235&w=2
http://marc.info/?l=bugtraq&m=142357976805598&w=2
http://marc.info/?l=bugtraq&m=142495837901899&w=2
http://marc.info/?l=bugtraq&m=142496355704097&w=2
http://marc.info/?l=bugtraq&m=142546741516006&w=2
http://marc.info/?l=bugtraq&m=142607790919348&w=2
http://marc.info/?l=bugtraq&m=142624590206005&w=2
http://marc.info/?l=bugtraq&m=142624619906067
http://marc.info/?l=bugtraq&m=142624619906067&w=2
http://marc.info/?l=bugtraq&m=142624679706236&w=2
http://marc.info/?l=bugtraq&m=142624719706349&w=2
http://marc.info/?l=bugtraq&m=142660345230545&w=2
http://marc.info/?l=bugtraq&m=142721830231196&w=2
http://marc.info/?l=bugtraq&m=142721887231400&w=2
http://marc.info/?l=bugtraq&m=142740155824959&w=2
http://marc.info/?l=bugtraq&m=142791032306609&w=2
http://marc.info/?l=bugtraq&m=142804214608580&w=2
http://marc.info/?l=bugtraq&m=142805027510172&w=2
http://marc.info/?l=bugtraq&m=142962817202793&w=2
http://marc.info/?l=bugtraq&m=143039249603103&w=2
http://marc.info/?l=bugtraq&m=143101048219218&w=2
http://marc.info/?l=bugtraq&m=143290371927178&w=2
http://marc.info/?l=bugtraq&m=143290437727362&w=2
http://marc.info/?l=bugtraq&m=143290522027658&w=2
http://marc.info/?l=bugtraq&m=143290583027876&w=2
http://marc.info/?l=bugtraq&m=143558137709884&w=2
http://marc.info/?l=bugtraq&m=143558192010071&w=2
http://marc.info/?l=bugtraq&m=143628269912142&w=2
http://marc.info/?l=bugtraq&m=144101915224472&w=2
http://marc.info/?l=bugtraq&m=144251162130364&w=2
http://marc.info/?l=bugtraq&m=144294141001552&w=2
http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=openssl-dev&m=141333049205629&w=2
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
http://rhn.redhat.com/errata/RHSA-2014-1652.html
http://rhn.redhat.com/errata/RHSA-2014-1653.html
http://rhn.redhat.com/errata/RHSA-2014-1692.html
http://rhn.redhat.com/errata/RHSA-2014-1876.html
http://rhn.redhat.com/errata/RHSA-2014-1877.html
http://rhn.redhat.com/errata/RHSA-2014-1880.html
http://rhn.redhat.com/errata/RHSA-2014-1881.html
http://rhn.redhat.com/errata/RHSA-2014-1882.html
http://rhn.redhat.com/errata/RHSA-2014-1920.html
http://rhn.redhat.com/errata/RHSA-2014-1948.html
http://rhn.redhat.com/errata/RHSA-2015-0068.html
http://rhn.redhat.com/errata/RHSA-2015-0079.html
http://rhn.redhat.com/errata/RHSA-2015-0080.html
http://rhn.redhat.com/errata/RHSA-2015-0085.html
http://rhn.redhat.com/errata/RHSA-2015-0086.html
http://rhn.redhat.com/errata/RHSA-2015-0264.html
http://rhn.redhat.com/errata/RHSA-2015-0698.html
http://rhn.redhat.com/errata/RHSA-2015-1545.html
http://rhn.redhat.com/errata/RHSA-2015-1546.html
http://secunia.com/advisories/59627
http://secunia.com/advisories/60056
http://secunia.com/advisories/60206
http://secunia.com/advisories/60792
http://secunia.com/advisories/60859
http://secunia.com/advisories/61019
http://secunia.com/advisories/61130
http://secunia.com/advisories/61303
http://secunia.com/advisories/61316
http://secunia.com/advisories/61345
http://secunia.com/advisories/61359
http://secunia.com/advisories/61782
http://secunia.com/advisories/61810
http://secunia.com/advisories/61819
http://secunia.com/advisories/61825
http://secunia.com/advisories/61827
http://secunia.com/advisories/61926
http://secunia.com/advisories/61995
http://support.apple.com/HT204244
http://support.citrix.com/article/CTX200238
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
http://www-01.ibm.com/support/docview.wss?uid=swg21687172
http://www-01.ibm.com/support/docview.wss?uid=swg21687611
http://www-01.ibm.com/support/docview.wss?uid=swg21688283
http://www-01.ibm.com/support/docview.wss?uid=swg21692299
http://www.debian.org/security/2014/dsa-3053
http://www.debian.org/security/2015/dsa-3144
http://www.debian.org/security/2015/dsa-3147
http://www.debian.org/security/2015/dsa-3253
http://www.debian.org/security/2016/dsa-3489
http://www.kb.cert.org/vuls/id/577193
http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/archive/1/533724/100/0/threaded
http://www.securityfocus.com/archive/1/533746
http://www.securityfocus.com/archive/1/533747
http://www.securityfocus.com/bid/70574
http://www.securitytracker.com/id/1031029
http://www.securitytracker.com/id/1031039
http://www.securitytracker.com/id/1031085
http://www.securitytracker.com/id/1031086
http://www.securitytracker.com/id/1031087
http://www.securitytracker.com/id/1031088
http://www.securitytracker.com/id/1031089
http://www.securitytracker.com/id/1031090
http://www.securitytracker.com/id/1031091
http://www.securitytracker.com/id/1031092
http://www.securitytracker.com/id/1031093
http://www.securitytracker.com/id/1031094
http://www.securitytracker.com/id/1031095
http://www.securitytracker.com/id/1031096
http://www.securitytracker.com/id/1031105
http://www.securitytracker.com/id/1031106
http://www.securitytracker.com/id/1031107
http://www.securitytracker.com/id/1031120
http://www.securitytracker.com/id/1031123
http://www.securitytracker.com/id/1031124
http://www.securitytracker.com/id/1031130
http://www.securitytracker.com/id/1031131
http://www.securitytracker.com/id/1031132
http://www.ubuntu.com/usn/USN-2486-1
http://www.ubuntu.com/usn/USN-2487-1
http://www.us-cert.gov/ncas/alerts/TA14-290A
http://www.vmware.com/security/advisories/VMSA-2015-0003.html
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
https://access.redhat.com/articles/1232123
https://access.redhat.com/security/cve/CVE-2014-3566
https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
https://bto.bluecoat.com/security-advisory/sa83
https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
https://bugzilla.redhat.com/show_bug.cgi?id=1152789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
https://github.com/mpgn/poodle-PoC
https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kc.mcafee.com/corporate/index?page=content&id=SB10090
https://kc.mcafee.com/corporate/index?page=content&id=SB10091
https://kc.mcafee.com/corporate/index?page=content&id=SB10104
https://linux.oracle.com/cve/CVE-2014-3566.html
https://linux.oracle.com/errata/ELSA-2015-0085.html
https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-3566
https://puppet.com/security/cve/poodle-sslv3-vulnerability
https://security.gentoo.org/glsa/201507-14
https://security.gentoo.org/glsa/201606-11
https://security.netapp.com/advisory/ntap-20141015-0001/
https://support.apple.com/HT205217
https://support.apple.com/kb/HT6527
https://support.apple.com/kb/HT6529
https://support.apple.com/kb/HT6531
https://support.apple.com/kb/HT6535
https://support.apple.com/kb/HT6536
https://support.apple.com/kb/HT6541
https://support.apple.com/kb/HT6542
https://support.citrix.com/article/CTX216642
https://support.lenovo.com/product_security/poodle
https://support.lenovo.com/us/en/product_security/poodle
https://technet.microsoft.com/library/security/3009008.aspx
https://ubuntu.com/security/notices/USN-2486-1
https://ubuntu.com/security/notices/USN-2487-1
https://www-01.ibm.com/support/docview.wss?uid=swg21688165
https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
https://www.cve.org/CVERecord?id=CVE-2014-3566
https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
https://www.elastic.co/blog/logstash-1-4-3-released
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/news/secadv_20141015.txt
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://www.suse.com/support/kb/doc.php?id=7015773
|
| gnutls |
CVE-2015-2808 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://nvd.nist.gov/vuln/detail/CVE-2015-2808
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
https://www.cve.org/CVERecord?id=CVE-2015-2808
https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
|
| gnutls |
CVE-2015-3308 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155101.html
http://www.gnutls.org/security.html#GNUTLS-SA-2015-4
http://www.openwall.com/lists/oss-security/2015/04/15/6
http://www.openwall.com/lists/oss-security/2015/04/16/6
http://www.securityfocus.com/bid/74188
http://www.securitytracker.com/id/1033774
http://www.ubuntu.com/usn/USN-2727-1
https://access.redhat.com/security/cve/CVE-2015-3308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3308
https://gitlab.com/gnutls/gnutls/commit/053ae65403216acdb0a4e78b25ad66ee9f444f02
https://gitlab.com/gnutls/gnutls/commit/d6972be33264ecc49a86cd0958209cd7363af1e9
https://nvd.nist.gov/vuln/detail/CVE-2015-3308
https://security.gentoo.org/glsa/201506-03
https://ubuntu.com/security/notices/USN-2727-1
https://www.cve.org/CVERecord?id=CVE-2015-3308
|
| gnutls |
CVE-2015-6251 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165286.html
http://lists.opensuse.org/opensuse-updates/2015-09/msg00001.html
http://www.debian.org/security/2015/dsa-3334
http://www.gnutls.org/security.html#GNUTLS-SA-2015-3
http://www.openwall.com/lists/oss-security/2015/08/10/1
http://www.openwall.com/lists/oss-security/2015/08/17/6
http://www.securityfocus.com/bid/76267
http://www.securitytracker.com/id/1033226
https://access.redhat.com/security/cve/CVE-2015-6251
https://bugzilla.redhat.com/show_bug.cgi?id=1251902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
https://gitlab.com/gnutls/gnutls/commit/272854367efc130fbd4f1a51840d80c630214e12
https://nvd.nist.gov/vuln/detail/CVE-2015-6251
https://ubuntu.com/security/notices/USN-2727-1
https://www.cve.org/CVERecord?id=CVE-2015-6251
|
| gnutls |
CVE-2016-8610 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://rhn.redhat.com/errata/RHSA-2017-0286.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/oss-sec/2016/q4/224
http://security.360.cn/cve/CVE-2016-8610
http://security.360.cn/cve/CVE-2016-8610/
http://www.openwall.com/lists/oss-security/2016/10/24/3
http://www.securityfocus.com/bid/93841
http://www.securitytracker.com/id/1037084
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/security/cve/CVE-2016-8610
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401
https://linux.oracle.com/cve/CVE-2016-8610.html
https://linux.oracle.com/errata/ELSA-2017-0574.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8610
https://security.360.cn/cve/CVE-2016-8610/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc
https://security.netapp.com/advisory/ntap-20171130-0001/
https://security.paloaltonetworks.com/CVE-2016-8610
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us
https://ubuntu.com/security/notices/USN-3181-1
https://ubuntu.com/security/notices/USN-3183-1
https://ubuntu.com/security/notices/USN-3183-2
https://www.cve.org/CVERecord?id=CVE-2016-8610
https://www.debian.org/security/2017/dsa-3773
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| gnutls |
CVE-2018-16868 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://cat.eyalro.net/
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html
http://www.securityfocus.com/bid/106080
https://access.redhat.com/security/cve/CVE-2018-16868
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
https://nvd.nist.gov/vuln/detail/CVE-2018-16868
https://www.cve.org/CVERecord?id=CVE-2018-16868
|
| gnutls |
CVE-2022-2509 |
MEDIUM |
3.3.29-9.el7_6 |
|
https://access.redhat.com/errata/RHSA-2022:6854
https://access.redhat.com/security/cve/CVE-2022-2509
https://bugzilla.redhat.com/2108977
https://bugzilla.redhat.com/show_bug.cgi?id=2076626
https://bugzilla.redhat.com/show_bug.cgi?id=2108635
https://bugzilla.redhat.com/show_bug.cgi?id=2108977
https://bugzilla.redhat.com/show_bug.cgi?id=2119770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
https://errata.almalinux.org/9/ALSA-2022-6854.html
https://errata.rockylinux.org/RLSA-2022:6854
https://gnutls.org/security-new.html (GNUTLS-SA-2022-07-07)
https://gnutls.org/security-new.html#GNUTLS-SA-2022-07-07
https://linux.oracle.com/cve/CVE-2022-2509.html
https://linux.oracle.com/errata/ELSA-2022-7105.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/
https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
https://nvd.nist.gov/vuln/detail/CVE-2022-2509
https://ubuntu.com/security/notices/USN-5550-1
https://www.cve.org/CVERecord?id=CVE-2022-2509
https://www.debian.org/security/2022/dsa-5203
|
| gnutls |
CVE-2023-0361 |
MEDIUM |
3.3.29-9.el7_6 |
|
https://access.redhat.com/errata/RHSA-2023:1141
https://access.redhat.com/security/cve/CVE-2023-0361
https://bugzilla.redhat.com/2162596
https://bugzilla.redhat.com/show_bug.cgi?id=2144537
https://bugzilla.redhat.com/show_bug.cgi?id=2149640
https://bugzilla.redhat.com/show_bug.cgi?id=2162596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361
https://errata.almalinux.org/9/ALSA-2023-1141.html
https://errata.rockylinux.org/RLSA-2023:1141
https://github.com/tlsfuzzer/tlsfuzzer/pull/679
https://gitlab.com/gnutls/gnutls/-/issues/1050
https://gnutls.org/security-new.html#GNUTLS-SA-2020-07-14
https://linux.oracle.com/cve/CVE-2023-0361.html
https://linux.oracle.com/errata/ELSA-2023-1569.html
https://lists.debian.org/debian-lts-announce/2023/02/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UFIA3X4IZ3CW7SRQ2UHNHNPMRIAWF2FI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS4KVDOG6QTALWHC2QE4Y7VPDRMLTRWQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z634YBXAJ5VLDI62IOPBVP5K6YFHAWCY/
https://nvd.nist.gov/vuln/detail/CVE-2023-0361
https://security.netapp.com/advisory/ntap-20230324-0005/
https://security.netapp.com/advisory/ntap-20230725-0005/
https://ubuntu.com/security/notices/USN-5901-1
https://www.cve.org/CVERecord?id=CVE-2023-0361
|
| gnutls |
CVE-2023-5981 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0155
https://access.redhat.com/errata/RHSA-2024:0319
https://access.redhat.com/errata/RHSA-2024:0399
https://access.redhat.com/errata/RHSA-2024:0451
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/security/cve/CVE-2023-5981
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2248445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://errata.rockylinux.org/RLSA-2024:0155
https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
https://linux.oracle.com/cve/CVE-2023-5981.html
https://linux.oracle.com/errata/ELSA-2024-0533.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html
https://nvd.nist.gov/vuln/detail/CVE-2023-5981
https://ubuntu.com/security/notices/USN-6499-1
https://ubuntu.com/security/notices/USN-6499-2
https://www.cve.org/CVERecord?id=CVE-2023-5981
|
| gnutls |
CVE-2024-0553 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/errata/RHSA-2024:0627
https://access.redhat.com/errata/RHSA-2024:0796
https://access.redhat.com/errata/RHSA-2024:1082
https://access.redhat.com/security/cve/CVE-2024-0553
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2258412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://errata.rockylinux.org/RLSA-2024:0627
https://gitlab.com/gnutls/gnutls/-/issues/1522
https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-14
https://linux.oracle.com/cve/CVE-2024-0553.html
https://linux.oracle.com/errata/ELSA-2024-12135.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
https://nvd.nist.gov/vuln/detail/CVE-2024-0553
https://security.netapp.com/advisory/ntap-20240202-0011/
https://ubuntu.com/security/notices/USN-6593-1
https://www.cve.org/CVERecord?id=CVE-2024-0553
|
| gnutls |
CVE-2024-0567 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/errata/RHSA-2024:1082
https://access.redhat.com/security/cve/CVE-2024-0567
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2258544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://gitlab.com/gnutls/gnutls/-/issues/1521
https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-09
https://linux.oracle.com/cve/CVE-2024-0567.html
https://linux.oracle.com/errata/ELSA-2024-0533.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
https://nvd.nist.gov/vuln/detail/CVE-2024-0567
https://security.netapp.com/advisory/ntap-20240202-0011/
https://ubuntu.com/security/notices/USN-6593-1
https://www.cve.org/CVERecord?id=CVE-2024-0567
|
| gnutls |
CVE-2015-0294 |
LOW |
3.3.29-9.el7_6 |
|
http://lists.gnutls.org/pipermail/gnutls-devel/2015-February/007471.html
http://www.debian.org/security/2015/dsa-3191
https://access.redhat.com/security/cve/CVE-2015-0294
https://bugzilla.redhat.com/show_bug.cgi?id=1196323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294
https://gitlab.com/gnutls/gnutls/commit/6e76e9b9fa845b76b0b9a45f05f4b54a052578ff
https://linux.oracle.com/cve/CVE-2015-0294.html
https://linux.oracle.com/errata/ELSA-2015-1457.html
https://nvd.nist.gov/vuln/detail/CVE-2015-0294
https://ubuntu.com/security/notices/USN-2540-1
https://www.cve.org/CVERecord?id=CVE-2015-0294
|
| gnutls |
CVE-2021-4209 |
LOW |
3.3.29-9.el7_6 |
|
https://access.redhat.com/security/cve/CVE-2021-4209
https://bugzilla.redhat.com/show_bug.cgi?id=2044156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209
https://gitlab.com/gnutls/gnutls/-/commit/3db352734472d851318944db13be73da61300568
https://gitlab.com/gnutls/gnutls/-/issues/1306
https://gitlab.com/gnutls/gnutls/-/merge_requests/1503
https://nvd.nist.gov/vuln/detail/CVE-2021-4209
https://security.netapp.com/advisory/ntap-20220915-0005/
https://ubuntu.com/security/notices/USN-5550-1
https://ubuntu.com/security/notices/USN-5750-1
https://www.cve.org/CVERecord?id=CVE-2021-4209
|
| gnutls-c++ |
CVE-2014-3566 |
HIGH |
3.3.29-9.el7_6 |
|
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
http://advisories.mageia.org/MGASA-2014-0416.html
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
http://askubuntu.com/a/537196
http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
http://downloads.asterisk.org/pub/security/AST-2014-011.html
http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
http://marc.info/?l=bugtraq&m=141450452204552&w=2
http://marc.info/?l=bugtraq&m=141450973807288&w=2
http://marc.info/?l=bugtraq&m=141477196830952&w=2
http://marc.info/?l=bugtraq&m=141576815022399&w=2
http://marc.info/?l=bugtraq&m=141577087123040&w=2
http://marc.info/?l=bugtraq&m=141577350823734&w=2
http://marc.info/?l=bugtraq&m=141620103726640&w=2
http://marc.info/?l=bugtraq&m=141628688425177&w=2
http://marc.info/?l=bugtraq&m=141694355519663&w=2
http://marc.info/?l=bugtraq&m=141697638231025&w=2
http://marc.info/?l=bugtraq&m=141697676231104&w=2
http://marc.info/?l=bugtraq&m=141703183219781&w=2
http://marc.info/?l=bugtraq&m=141715130023061&w=2
http://marc.info/?l=bugtraq&m=141775427104070&w=2
http://marc.info/?l=bugtraq&m=141813976718456&w=2
http://marc.info/?l=bugtraq&m=141814011518700&w=2
http://marc.info/?l=bugtraq&m=141879378918327&w=2
http://marc.info/?l=bugtraq&m=142103967620673&w=2
http://marc.info/?l=bugtraq&m=142118135300698&w=2
http://marc.info/?l=bugtraq&m=142296755107581&w=2
http://marc.info/?l=bugtraq&m=142350196615714&w=2
http://marc.info/?l=bugtraq&m=142350298616097&w=2
http://marc.info/?l=bugtraq&m=142350743917559&w=2
http://marc.info/?l=bugtraq&m=142354438527235&w=2
http://marc.info/?l=bugtraq&m=142357976805598&w=2
http://marc.info/?l=bugtraq&m=142495837901899&w=2
http://marc.info/?l=bugtraq&m=142496355704097&w=2
http://marc.info/?l=bugtraq&m=142546741516006&w=2
http://marc.info/?l=bugtraq&m=142607790919348&w=2
http://marc.info/?l=bugtraq&m=142624590206005&w=2
http://marc.info/?l=bugtraq&m=142624619906067
http://marc.info/?l=bugtraq&m=142624619906067&w=2
http://marc.info/?l=bugtraq&m=142624679706236&w=2
http://marc.info/?l=bugtraq&m=142624719706349&w=2
http://marc.info/?l=bugtraq&m=142660345230545&w=2
http://marc.info/?l=bugtraq&m=142721830231196&w=2
http://marc.info/?l=bugtraq&m=142721887231400&w=2
http://marc.info/?l=bugtraq&m=142740155824959&w=2
http://marc.info/?l=bugtraq&m=142791032306609&w=2
http://marc.info/?l=bugtraq&m=142804214608580&w=2
http://marc.info/?l=bugtraq&m=142805027510172&w=2
http://marc.info/?l=bugtraq&m=142962817202793&w=2
http://marc.info/?l=bugtraq&m=143039249603103&w=2
http://marc.info/?l=bugtraq&m=143101048219218&w=2
http://marc.info/?l=bugtraq&m=143290371927178&w=2
http://marc.info/?l=bugtraq&m=143290437727362&w=2
http://marc.info/?l=bugtraq&m=143290522027658&w=2
http://marc.info/?l=bugtraq&m=143290583027876&w=2
http://marc.info/?l=bugtraq&m=143558137709884&w=2
http://marc.info/?l=bugtraq&m=143558192010071&w=2
http://marc.info/?l=bugtraq&m=143628269912142&w=2
http://marc.info/?l=bugtraq&m=144101915224472&w=2
http://marc.info/?l=bugtraq&m=144251162130364&w=2
http://marc.info/?l=bugtraq&m=144294141001552&w=2
http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=openssl-dev&m=141333049205629&w=2
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
http://rhn.redhat.com/errata/RHSA-2014-1652.html
http://rhn.redhat.com/errata/RHSA-2014-1653.html
http://rhn.redhat.com/errata/RHSA-2014-1692.html
http://rhn.redhat.com/errata/RHSA-2014-1876.html
http://rhn.redhat.com/errata/RHSA-2014-1877.html
http://rhn.redhat.com/errata/RHSA-2014-1880.html
http://rhn.redhat.com/errata/RHSA-2014-1881.html
http://rhn.redhat.com/errata/RHSA-2014-1882.html
http://rhn.redhat.com/errata/RHSA-2014-1920.html
http://rhn.redhat.com/errata/RHSA-2014-1948.html
http://rhn.redhat.com/errata/RHSA-2015-0068.html
http://rhn.redhat.com/errata/RHSA-2015-0079.html
http://rhn.redhat.com/errata/RHSA-2015-0080.html
http://rhn.redhat.com/errata/RHSA-2015-0085.html
http://rhn.redhat.com/errata/RHSA-2015-0086.html
http://rhn.redhat.com/errata/RHSA-2015-0264.html
http://rhn.redhat.com/errata/RHSA-2015-0698.html
http://rhn.redhat.com/errata/RHSA-2015-1545.html
http://rhn.redhat.com/errata/RHSA-2015-1546.html
http://secunia.com/advisories/59627
http://secunia.com/advisories/60056
http://secunia.com/advisories/60206
http://secunia.com/advisories/60792
http://secunia.com/advisories/60859
http://secunia.com/advisories/61019
http://secunia.com/advisories/61130
http://secunia.com/advisories/61303
http://secunia.com/advisories/61316
http://secunia.com/advisories/61345
http://secunia.com/advisories/61359
http://secunia.com/advisories/61782
http://secunia.com/advisories/61810
http://secunia.com/advisories/61819
http://secunia.com/advisories/61825
http://secunia.com/advisories/61827
http://secunia.com/advisories/61926
http://secunia.com/advisories/61995
http://support.apple.com/HT204244
http://support.citrix.com/article/CTX200238
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
http://www-01.ibm.com/support/docview.wss?uid=swg21687172
http://www-01.ibm.com/support/docview.wss?uid=swg21687611
http://www-01.ibm.com/support/docview.wss?uid=swg21688283
http://www-01.ibm.com/support/docview.wss?uid=swg21692299
http://www.debian.org/security/2014/dsa-3053
http://www.debian.org/security/2015/dsa-3144
http://www.debian.org/security/2015/dsa-3147
http://www.debian.org/security/2015/dsa-3253
http://www.debian.org/security/2016/dsa-3489
http://www.kb.cert.org/vuls/id/577193
http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/archive/1/533724/100/0/threaded
http://www.securityfocus.com/archive/1/533746
http://www.securityfocus.com/archive/1/533747
http://www.securityfocus.com/bid/70574
http://www.securitytracker.com/id/1031029
http://www.securitytracker.com/id/1031039
http://www.securitytracker.com/id/1031085
http://www.securitytracker.com/id/1031086
http://www.securitytracker.com/id/1031087
http://www.securitytracker.com/id/1031088
http://www.securitytracker.com/id/1031089
http://www.securitytracker.com/id/1031090
http://www.securitytracker.com/id/1031091
http://www.securitytracker.com/id/1031092
http://www.securitytracker.com/id/1031093
http://www.securitytracker.com/id/1031094
http://www.securitytracker.com/id/1031095
http://www.securitytracker.com/id/1031096
http://www.securitytracker.com/id/1031105
http://www.securitytracker.com/id/1031106
http://www.securitytracker.com/id/1031107
http://www.securitytracker.com/id/1031120
http://www.securitytracker.com/id/1031123
http://www.securitytracker.com/id/1031124
http://www.securitytracker.com/id/1031130
http://www.securitytracker.com/id/1031131
http://www.securitytracker.com/id/1031132
http://www.ubuntu.com/usn/USN-2486-1
http://www.ubuntu.com/usn/USN-2487-1
http://www.us-cert.gov/ncas/alerts/TA14-290A
http://www.vmware.com/security/advisories/VMSA-2015-0003.html
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
https://access.redhat.com/articles/1232123
https://access.redhat.com/security/cve/CVE-2014-3566
https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
https://bto.bluecoat.com/security-advisory/sa83
https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
https://bugzilla.redhat.com/show_bug.cgi?id=1152789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
https://github.com/mpgn/poodle-PoC
https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kc.mcafee.com/corporate/index?page=content&id=SB10090
https://kc.mcafee.com/corporate/index?page=content&id=SB10091
https://kc.mcafee.com/corporate/index?page=content&id=SB10104
https://linux.oracle.com/cve/CVE-2014-3566.html
https://linux.oracle.com/errata/ELSA-2015-0085.html
https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-3566
https://puppet.com/security/cve/poodle-sslv3-vulnerability
https://security.gentoo.org/glsa/201507-14
https://security.gentoo.org/glsa/201606-11
https://security.netapp.com/advisory/ntap-20141015-0001/
https://support.apple.com/HT205217
https://support.apple.com/kb/HT6527
https://support.apple.com/kb/HT6529
https://support.apple.com/kb/HT6531
https://support.apple.com/kb/HT6535
https://support.apple.com/kb/HT6536
https://support.apple.com/kb/HT6541
https://support.apple.com/kb/HT6542
https://support.citrix.com/article/CTX216642
https://support.lenovo.com/product_security/poodle
https://support.lenovo.com/us/en/product_security/poodle
https://technet.microsoft.com/library/security/3009008.aspx
https://ubuntu.com/security/notices/USN-2486-1
https://ubuntu.com/security/notices/USN-2487-1
https://www-01.ibm.com/support/docview.wss?uid=swg21688165
https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
https://www.cve.org/CVERecord?id=CVE-2014-3566
https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
https://www.elastic.co/blog/logstash-1-4-3-released
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/news/secadv_20141015.txt
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://www.suse.com/support/kb/doc.php?id=7015773
|
| gnutls-c++ |
CVE-2015-2808 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://nvd.nist.gov/vuln/detail/CVE-2015-2808
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
https://www.cve.org/CVERecord?id=CVE-2015-2808
https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
|
| gnutls-c++ |
CVE-2015-3308 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155101.html
http://www.gnutls.org/security.html#GNUTLS-SA-2015-4
http://www.openwall.com/lists/oss-security/2015/04/15/6
http://www.openwall.com/lists/oss-security/2015/04/16/6
http://www.securityfocus.com/bid/74188
http://www.securitytracker.com/id/1033774
http://www.ubuntu.com/usn/USN-2727-1
https://access.redhat.com/security/cve/CVE-2015-3308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3308
https://gitlab.com/gnutls/gnutls/commit/053ae65403216acdb0a4e78b25ad66ee9f444f02
https://gitlab.com/gnutls/gnutls/commit/d6972be33264ecc49a86cd0958209cd7363af1e9
https://nvd.nist.gov/vuln/detail/CVE-2015-3308
https://security.gentoo.org/glsa/201506-03
https://ubuntu.com/security/notices/USN-2727-1
https://www.cve.org/CVERecord?id=CVE-2015-3308
|
| gnutls-c++ |
CVE-2015-6251 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165286.html
http://lists.opensuse.org/opensuse-updates/2015-09/msg00001.html
http://www.debian.org/security/2015/dsa-3334
http://www.gnutls.org/security.html#GNUTLS-SA-2015-3
http://www.openwall.com/lists/oss-security/2015/08/10/1
http://www.openwall.com/lists/oss-security/2015/08/17/6
http://www.securityfocus.com/bid/76267
http://www.securitytracker.com/id/1033226
https://access.redhat.com/security/cve/CVE-2015-6251
https://bugzilla.redhat.com/show_bug.cgi?id=1251902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
https://gitlab.com/gnutls/gnutls/commit/272854367efc130fbd4f1a51840d80c630214e12
https://nvd.nist.gov/vuln/detail/CVE-2015-6251
https://ubuntu.com/security/notices/USN-2727-1
https://www.cve.org/CVERecord?id=CVE-2015-6251
|
| gnutls-c++ |
CVE-2016-8610 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://rhn.redhat.com/errata/RHSA-2017-0286.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/oss-sec/2016/q4/224
http://security.360.cn/cve/CVE-2016-8610
http://security.360.cn/cve/CVE-2016-8610/
http://www.openwall.com/lists/oss-security/2016/10/24/3
http://www.securityfocus.com/bid/93841
http://www.securitytracker.com/id/1037084
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/security/cve/CVE-2016-8610
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401
https://linux.oracle.com/cve/CVE-2016-8610.html
https://linux.oracle.com/errata/ELSA-2017-0574.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8610
https://security.360.cn/cve/CVE-2016-8610/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc
https://security.netapp.com/advisory/ntap-20171130-0001/
https://security.paloaltonetworks.com/CVE-2016-8610
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us
https://ubuntu.com/security/notices/USN-3181-1
https://ubuntu.com/security/notices/USN-3183-1
https://ubuntu.com/security/notices/USN-3183-2
https://www.cve.org/CVERecord?id=CVE-2016-8610
https://www.debian.org/security/2017/dsa-3773
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| gnutls-c++ |
CVE-2018-16868 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://cat.eyalro.net/
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html
http://www.securityfocus.com/bid/106080
https://access.redhat.com/security/cve/CVE-2018-16868
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
https://nvd.nist.gov/vuln/detail/CVE-2018-16868
https://www.cve.org/CVERecord?id=CVE-2018-16868
|
| gnutls-c++ |
CVE-2022-2509 |
MEDIUM |
3.3.29-9.el7_6 |
|
https://access.redhat.com/errata/RHSA-2022:6854
https://access.redhat.com/security/cve/CVE-2022-2509
https://bugzilla.redhat.com/2108977
https://bugzilla.redhat.com/show_bug.cgi?id=2076626
https://bugzilla.redhat.com/show_bug.cgi?id=2108635
https://bugzilla.redhat.com/show_bug.cgi?id=2108977
https://bugzilla.redhat.com/show_bug.cgi?id=2119770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
https://errata.almalinux.org/9/ALSA-2022-6854.html
https://errata.rockylinux.org/RLSA-2022:6854
https://gnutls.org/security-new.html (GNUTLS-SA-2022-07-07)
https://gnutls.org/security-new.html#GNUTLS-SA-2022-07-07
https://linux.oracle.com/cve/CVE-2022-2509.html
https://linux.oracle.com/errata/ELSA-2022-7105.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/
https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
https://nvd.nist.gov/vuln/detail/CVE-2022-2509
https://ubuntu.com/security/notices/USN-5550-1
https://www.cve.org/CVERecord?id=CVE-2022-2509
https://www.debian.org/security/2022/dsa-5203
|
| gnutls-c++ |
CVE-2023-0361 |
MEDIUM |
3.3.29-9.el7_6 |
|
https://access.redhat.com/errata/RHSA-2023:1141
https://access.redhat.com/security/cve/CVE-2023-0361
https://bugzilla.redhat.com/2162596
https://bugzilla.redhat.com/show_bug.cgi?id=2144537
https://bugzilla.redhat.com/show_bug.cgi?id=2149640
https://bugzilla.redhat.com/show_bug.cgi?id=2162596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361
https://errata.almalinux.org/9/ALSA-2023-1141.html
https://errata.rockylinux.org/RLSA-2023:1141
https://github.com/tlsfuzzer/tlsfuzzer/pull/679
https://gitlab.com/gnutls/gnutls/-/issues/1050
https://gnutls.org/security-new.html#GNUTLS-SA-2020-07-14
https://linux.oracle.com/cve/CVE-2023-0361.html
https://linux.oracle.com/errata/ELSA-2023-1569.html
https://lists.debian.org/debian-lts-announce/2023/02/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UFIA3X4IZ3CW7SRQ2UHNHNPMRIAWF2FI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS4KVDOG6QTALWHC2QE4Y7VPDRMLTRWQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z634YBXAJ5VLDI62IOPBVP5K6YFHAWCY/
https://nvd.nist.gov/vuln/detail/CVE-2023-0361
https://security.netapp.com/advisory/ntap-20230324-0005/
https://security.netapp.com/advisory/ntap-20230725-0005/
https://ubuntu.com/security/notices/USN-5901-1
https://www.cve.org/CVERecord?id=CVE-2023-0361
|
| gnutls-c++ |
CVE-2023-5981 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0155
https://access.redhat.com/errata/RHSA-2024:0319
https://access.redhat.com/errata/RHSA-2024:0399
https://access.redhat.com/errata/RHSA-2024:0451
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/security/cve/CVE-2023-5981
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2248445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://errata.rockylinux.org/RLSA-2024:0155
https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
https://linux.oracle.com/cve/CVE-2023-5981.html
https://linux.oracle.com/errata/ELSA-2024-0533.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html
https://nvd.nist.gov/vuln/detail/CVE-2023-5981
https://ubuntu.com/security/notices/USN-6499-1
https://ubuntu.com/security/notices/USN-6499-2
https://www.cve.org/CVERecord?id=CVE-2023-5981
|
| gnutls-c++ |
CVE-2024-0553 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/errata/RHSA-2024:0627
https://access.redhat.com/errata/RHSA-2024:0796
https://access.redhat.com/errata/RHSA-2024:1082
https://access.redhat.com/security/cve/CVE-2024-0553
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2258412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://errata.rockylinux.org/RLSA-2024:0627
https://gitlab.com/gnutls/gnutls/-/issues/1522
https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-14
https://linux.oracle.com/cve/CVE-2024-0553.html
https://linux.oracle.com/errata/ELSA-2024-12135.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
https://nvd.nist.gov/vuln/detail/CVE-2024-0553
https://security.netapp.com/advisory/ntap-20240202-0011/
https://ubuntu.com/security/notices/USN-6593-1
https://www.cve.org/CVERecord?id=CVE-2024-0553
|
| gnutls-c++ |
CVE-2024-0567 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/errata/RHSA-2024:1082
https://access.redhat.com/security/cve/CVE-2024-0567
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2258544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://gitlab.com/gnutls/gnutls/-/issues/1521
https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-09
https://linux.oracle.com/cve/CVE-2024-0567.html
https://linux.oracle.com/errata/ELSA-2024-0533.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
https://nvd.nist.gov/vuln/detail/CVE-2024-0567
https://security.netapp.com/advisory/ntap-20240202-0011/
https://ubuntu.com/security/notices/USN-6593-1
https://www.cve.org/CVERecord?id=CVE-2024-0567
|
| gnutls-c++ |
CVE-2015-0294 |
LOW |
3.3.29-9.el7_6 |
|
http://lists.gnutls.org/pipermail/gnutls-devel/2015-February/007471.html
http://www.debian.org/security/2015/dsa-3191
https://access.redhat.com/security/cve/CVE-2015-0294
https://bugzilla.redhat.com/show_bug.cgi?id=1196323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294
https://gitlab.com/gnutls/gnutls/commit/6e76e9b9fa845b76b0b9a45f05f4b54a052578ff
https://linux.oracle.com/cve/CVE-2015-0294.html
https://linux.oracle.com/errata/ELSA-2015-1457.html
https://nvd.nist.gov/vuln/detail/CVE-2015-0294
https://ubuntu.com/security/notices/USN-2540-1
https://www.cve.org/CVERecord?id=CVE-2015-0294
|
| gnutls-c++ |
CVE-2021-4209 |
LOW |
3.3.29-9.el7_6 |
|
https://access.redhat.com/security/cve/CVE-2021-4209
https://bugzilla.redhat.com/show_bug.cgi?id=2044156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209
https://gitlab.com/gnutls/gnutls/-/commit/3db352734472d851318944db13be73da61300568
https://gitlab.com/gnutls/gnutls/-/issues/1306
https://gitlab.com/gnutls/gnutls/-/merge_requests/1503
https://nvd.nist.gov/vuln/detail/CVE-2021-4209
https://security.netapp.com/advisory/ntap-20220915-0005/
https://ubuntu.com/security/notices/USN-5550-1
https://ubuntu.com/security/notices/USN-5750-1
https://www.cve.org/CVERecord?id=CVE-2021-4209
|
| gnutls-dane |
CVE-2014-3566 |
HIGH |
3.3.29-9.el7_6 |
|
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
http://advisories.mageia.org/MGASA-2014-0416.html
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
http://askubuntu.com/a/537196
http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
http://downloads.asterisk.org/pub/security/AST-2014-011.html
http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
http://marc.info/?l=bugtraq&m=141450452204552&w=2
http://marc.info/?l=bugtraq&m=141450973807288&w=2
http://marc.info/?l=bugtraq&m=141477196830952&w=2
http://marc.info/?l=bugtraq&m=141576815022399&w=2
http://marc.info/?l=bugtraq&m=141577087123040&w=2
http://marc.info/?l=bugtraq&m=141577350823734&w=2
http://marc.info/?l=bugtraq&m=141620103726640&w=2
http://marc.info/?l=bugtraq&m=141628688425177&w=2
http://marc.info/?l=bugtraq&m=141694355519663&w=2
http://marc.info/?l=bugtraq&m=141697638231025&w=2
http://marc.info/?l=bugtraq&m=141697676231104&w=2
http://marc.info/?l=bugtraq&m=141703183219781&w=2
http://marc.info/?l=bugtraq&m=141715130023061&w=2
http://marc.info/?l=bugtraq&m=141775427104070&w=2
http://marc.info/?l=bugtraq&m=141813976718456&w=2
http://marc.info/?l=bugtraq&m=141814011518700&w=2
http://marc.info/?l=bugtraq&m=141879378918327&w=2
http://marc.info/?l=bugtraq&m=142103967620673&w=2
http://marc.info/?l=bugtraq&m=142118135300698&w=2
http://marc.info/?l=bugtraq&m=142296755107581&w=2
http://marc.info/?l=bugtraq&m=142350196615714&w=2
http://marc.info/?l=bugtraq&m=142350298616097&w=2
http://marc.info/?l=bugtraq&m=142350743917559&w=2
http://marc.info/?l=bugtraq&m=142354438527235&w=2
http://marc.info/?l=bugtraq&m=142357976805598&w=2
http://marc.info/?l=bugtraq&m=142495837901899&w=2
http://marc.info/?l=bugtraq&m=142496355704097&w=2
http://marc.info/?l=bugtraq&m=142546741516006&w=2
http://marc.info/?l=bugtraq&m=142607790919348&w=2
http://marc.info/?l=bugtraq&m=142624590206005&w=2
http://marc.info/?l=bugtraq&m=142624619906067
http://marc.info/?l=bugtraq&m=142624619906067&w=2
http://marc.info/?l=bugtraq&m=142624679706236&w=2
http://marc.info/?l=bugtraq&m=142624719706349&w=2
http://marc.info/?l=bugtraq&m=142660345230545&w=2
http://marc.info/?l=bugtraq&m=142721830231196&w=2
http://marc.info/?l=bugtraq&m=142721887231400&w=2
http://marc.info/?l=bugtraq&m=142740155824959&w=2
http://marc.info/?l=bugtraq&m=142791032306609&w=2
http://marc.info/?l=bugtraq&m=142804214608580&w=2
http://marc.info/?l=bugtraq&m=142805027510172&w=2
http://marc.info/?l=bugtraq&m=142962817202793&w=2
http://marc.info/?l=bugtraq&m=143039249603103&w=2
http://marc.info/?l=bugtraq&m=143101048219218&w=2
http://marc.info/?l=bugtraq&m=143290371927178&w=2
http://marc.info/?l=bugtraq&m=143290437727362&w=2
http://marc.info/?l=bugtraq&m=143290522027658&w=2
http://marc.info/?l=bugtraq&m=143290583027876&w=2
http://marc.info/?l=bugtraq&m=143558137709884&w=2
http://marc.info/?l=bugtraq&m=143558192010071&w=2
http://marc.info/?l=bugtraq&m=143628269912142&w=2
http://marc.info/?l=bugtraq&m=144101915224472&w=2
http://marc.info/?l=bugtraq&m=144251162130364&w=2
http://marc.info/?l=bugtraq&m=144294141001552&w=2
http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=openssl-dev&m=141333049205629&w=2
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
http://rhn.redhat.com/errata/RHSA-2014-1652.html
http://rhn.redhat.com/errata/RHSA-2014-1653.html
http://rhn.redhat.com/errata/RHSA-2014-1692.html
http://rhn.redhat.com/errata/RHSA-2014-1876.html
http://rhn.redhat.com/errata/RHSA-2014-1877.html
http://rhn.redhat.com/errata/RHSA-2014-1880.html
http://rhn.redhat.com/errata/RHSA-2014-1881.html
http://rhn.redhat.com/errata/RHSA-2014-1882.html
http://rhn.redhat.com/errata/RHSA-2014-1920.html
http://rhn.redhat.com/errata/RHSA-2014-1948.html
http://rhn.redhat.com/errata/RHSA-2015-0068.html
http://rhn.redhat.com/errata/RHSA-2015-0079.html
http://rhn.redhat.com/errata/RHSA-2015-0080.html
http://rhn.redhat.com/errata/RHSA-2015-0085.html
http://rhn.redhat.com/errata/RHSA-2015-0086.html
http://rhn.redhat.com/errata/RHSA-2015-0264.html
http://rhn.redhat.com/errata/RHSA-2015-0698.html
http://rhn.redhat.com/errata/RHSA-2015-1545.html
http://rhn.redhat.com/errata/RHSA-2015-1546.html
http://secunia.com/advisories/59627
http://secunia.com/advisories/60056
http://secunia.com/advisories/60206
http://secunia.com/advisories/60792
http://secunia.com/advisories/60859
http://secunia.com/advisories/61019
http://secunia.com/advisories/61130
http://secunia.com/advisories/61303
http://secunia.com/advisories/61316
http://secunia.com/advisories/61345
http://secunia.com/advisories/61359
http://secunia.com/advisories/61782
http://secunia.com/advisories/61810
http://secunia.com/advisories/61819
http://secunia.com/advisories/61825
http://secunia.com/advisories/61827
http://secunia.com/advisories/61926
http://secunia.com/advisories/61995
http://support.apple.com/HT204244
http://support.citrix.com/article/CTX200238
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
http://www-01.ibm.com/support/docview.wss?uid=swg21687172
http://www-01.ibm.com/support/docview.wss?uid=swg21687611
http://www-01.ibm.com/support/docview.wss?uid=swg21688283
http://www-01.ibm.com/support/docview.wss?uid=swg21692299
http://www.debian.org/security/2014/dsa-3053
http://www.debian.org/security/2015/dsa-3144
http://www.debian.org/security/2015/dsa-3147
http://www.debian.org/security/2015/dsa-3253
http://www.debian.org/security/2016/dsa-3489
http://www.kb.cert.org/vuls/id/577193
http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/archive/1/533724/100/0/threaded
http://www.securityfocus.com/archive/1/533746
http://www.securityfocus.com/archive/1/533747
http://www.securityfocus.com/bid/70574
http://www.securitytracker.com/id/1031029
http://www.securitytracker.com/id/1031039
http://www.securitytracker.com/id/1031085
http://www.securitytracker.com/id/1031086
http://www.securitytracker.com/id/1031087
http://www.securitytracker.com/id/1031088
http://www.securitytracker.com/id/1031089
http://www.securitytracker.com/id/1031090
http://www.securitytracker.com/id/1031091
http://www.securitytracker.com/id/1031092
http://www.securitytracker.com/id/1031093
http://www.securitytracker.com/id/1031094
http://www.securitytracker.com/id/1031095
http://www.securitytracker.com/id/1031096
http://www.securitytracker.com/id/1031105
http://www.securitytracker.com/id/1031106
http://www.securitytracker.com/id/1031107
http://www.securitytracker.com/id/1031120
http://www.securitytracker.com/id/1031123
http://www.securitytracker.com/id/1031124
http://www.securitytracker.com/id/1031130
http://www.securitytracker.com/id/1031131
http://www.securitytracker.com/id/1031132
http://www.ubuntu.com/usn/USN-2486-1
http://www.ubuntu.com/usn/USN-2487-1
http://www.us-cert.gov/ncas/alerts/TA14-290A
http://www.vmware.com/security/advisories/VMSA-2015-0003.html
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
https://access.redhat.com/articles/1232123
https://access.redhat.com/security/cve/CVE-2014-3566
https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
https://bto.bluecoat.com/security-advisory/sa83
https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
https://bugzilla.redhat.com/show_bug.cgi?id=1152789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
https://github.com/mpgn/poodle-PoC
https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kc.mcafee.com/corporate/index?page=content&id=SB10090
https://kc.mcafee.com/corporate/index?page=content&id=SB10091
https://kc.mcafee.com/corporate/index?page=content&id=SB10104
https://linux.oracle.com/cve/CVE-2014-3566.html
https://linux.oracle.com/errata/ELSA-2015-0085.html
https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-3566
https://puppet.com/security/cve/poodle-sslv3-vulnerability
https://security.gentoo.org/glsa/201507-14
https://security.gentoo.org/glsa/201606-11
https://security.netapp.com/advisory/ntap-20141015-0001/
https://support.apple.com/HT205217
https://support.apple.com/kb/HT6527
https://support.apple.com/kb/HT6529
https://support.apple.com/kb/HT6531
https://support.apple.com/kb/HT6535
https://support.apple.com/kb/HT6536
https://support.apple.com/kb/HT6541
https://support.apple.com/kb/HT6542
https://support.citrix.com/article/CTX216642
https://support.lenovo.com/product_security/poodle
https://support.lenovo.com/us/en/product_security/poodle
https://technet.microsoft.com/library/security/3009008.aspx
https://ubuntu.com/security/notices/USN-2486-1
https://ubuntu.com/security/notices/USN-2487-1
https://www-01.ibm.com/support/docview.wss?uid=swg21688165
https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
https://www.cve.org/CVERecord?id=CVE-2014-3566
https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
https://www.elastic.co/blog/logstash-1-4-3-released
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/news/secadv_20141015.txt
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://www.suse.com/support/kb/doc.php?id=7015773
|
| gnutls-dane |
CVE-2015-2808 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://nvd.nist.gov/vuln/detail/CVE-2015-2808
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
https://www.cve.org/CVERecord?id=CVE-2015-2808
https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
|
| gnutls-dane |
CVE-2015-3308 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155101.html
http://www.gnutls.org/security.html#GNUTLS-SA-2015-4
http://www.openwall.com/lists/oss-security/2015/04/15/6
http://www.openwall.com/lists/oss-security/2015/04/16/6
http://www.securityfocus.com/bid/74188
http://www.securitytracker.com/id/1033774
http://www.ubuntu.com/usn/USN-2727-1
https://access.redhat.com/security/cve/CVE-2015-3308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3308
https://gitlab.com/gnutls/gnutls/commit/053ae65403216acdb0a4e78b25ad66ee9f444f02
https://gitlab.com/gnutls/gnutls/commit/d6972be33264ecc49a86cd0958209cd7363af1e9
https://nvd.nist.gov/vuln/detail/CVE-2015-3308
https://security.gentoo.org/glsa/201506-03
https://ubuntu.com/security/notices/USN-2727-1
https://www.cve.org/CVERecord?id=CVE-2015-3308
|
| gnutls-dane |
CVE-2015-6251 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165286.html
http://lists.opensuse.org/opensuse-updates/2015-09/msg00001.html
http://www.debian.org/security/2015/dsa-3334
http://www.gnutls.org/security.html#GNUTLS-SA-2015-3
http://www.openwall.com/lists/oss-security/2015/08/10/1
http://www.openwall.com/lists/oss-security/2015/08/17/6
http://www.securityfocus.com/bid/76267
http://www.securitytracker.com/id/1033226
https://access.redhat.com/security/cve/CVE-2015-6251
https://bugzilla.redhat.com/show_bug.cgi?id=1251902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
https://gitlab.com/gnutls/gnutls/commit/272854367efc130fbd4f1a51840d80c630214e12
https://nvd.nist.gov/vuln/detail/CVE-2015-6251
https://ubuntu.com/security/notices/USN-2727-1
https://www.cve.org/CVERecord?id=CVE-2015-6251
|
| gnutls-dane |
CVE-2016-8610 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://rhn.redhat.com/errata/RHSA-2017-0286.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/oss-sec/2016/q4/224
http://security.360.cn/cve/CVE-2016-8610
http://security.360.cn/cve/CVE-2016-8610/
http://www.openwall.com/lists/oss-security/2016/10/24/3
http://www.securityfocus.com/bid/93841
http://www.securitytracker.com/id/1037084
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/security/cve/CVE-2016-8610
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401
https://linux.oracle.com/cve/CVE-2016-8610.html
https://linux.oracle.com/errata/ELSA-2017-0574.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8610
https://security.360.cn/cve/CVE-2016-8610/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc
https://security.netapp.com/advisory/ntap-20171130-0001/
https://security.paloaltonetworks.com/CVE-2016-8610
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us
https://ubuntu.com/security/notices/USN-3181-1
https://ubuntu.com/security/notices/USN-3183-1
https://ubuntu.com/security/notices/USN-3183-2
https://www.cve.org/CVERecord?id=CVE-2016-8610
https://www.debian.org/security/2017/dsa-3773
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| gnutls-dane |
CVE-2018-16868 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://cat.eyalro.net/
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html
http://www.securityfocus.com/bid/106080
https://access.redhat.com/security/cve/CVE-2018-16868
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
https://nvd.nist.gov/vuln/detail/CVE-2018-16868
https://www.cve.org/CVERecord?id=CVE-2018-16868
|
| gnutls-dane |
CVE-2022-2509 |
MEDIUM |
3.3.29-9.el7_6 |
|
https://access.redhat.com/errata/RHSA-2022:6854
https://access.redhat.com/security/cve/CVE-2022-2509
https://bugzilla.redhat.com/2108977
https://bugzilla.redhat.com/show_bug.cgi?id=2076626
https://bugzilla.redhat.com/show_bug.cgi?id=2108635
https://bugzilla.redhat.com/show_bug.cgi?id=2108977
https://bugzilla.redhat.com/show_bug.cgi?id=2119770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
https://errata.almalinux.org/9/ALSA-2022-6854.html
https://errata.rockylinux.org/RLSA-2022:6854
https://gnutls.org/security-new.html (GNUTLS-SA-2022-07-07)
https://gnutls.org/security-new.html#GNUTLS-SA-2022-07-07
https://linux.oracle.com/cve/CVE-2022-2509.html
https://linux.oracle.com/errata/ELSA-2022-7105.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/
https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
https://nvd.nist.gov/vuln/detail/CVE-2022-2509
https://ubuntu.com/security/notices/USN-5550-1
https://www.cve.org/CVERecord?id=CVE-2022-2509
https://www.debian.org/security/2022/dsa-5203
|
| gnutls-dane |
CVE-2023-0361 |
MEDIUM |
3.3.29-9.el7_6 |
|
https://access.redhat.com/errata/RHSA-2023:1141
https://access.redhat.com/security/cve/CVE-2023-0361
https://bugzilla.redhat.com/2162596
https://bugzilla.redhat.com/show_bug.cgi?id=2144537
https://bugzilla.redhat.com/show_bug.cgi?id=2149640
https://bugzilla.redhat.com/show_bug.cgi?id=2162596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361
https://errata.almalinux.org/9/ALSA-2023-1141.html
https://errata.rockylinux.org/RLSA-2023:1141
https://github.com/tlsfuzzer/tlsfuzzer/pull/679
https://gitlab.com/gnutls/gnutls/-/issues/1050
https://gnutls.org/security-new.html#GNUTLS-SA-2020-07-14
https://linux.oracle.com/cve/CVE-2023-0361.html
https://linux.oracle.com/errata/ELSA-2023-1569.html
https://lists.debian.org/debian-lts-announce/2023/02/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UFIA3X4IZ3CW7SRQ2UHNHNPMRIAWF2FI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS4KVDOG6QTALWHC2QE4Y7VPDRMLTRWQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z634YBXAJ5VLDI62IOPBVP5K6YFHAWCY/
https://nvd.nist.gov/vuln/detail/CVE-2023-0361
https://security.netapp.com/advisory/ntap-20230324-0005/
https://security.netapp.com/advisory/ntap-20230725-0005/
https://ubuntu.com/security/notices/USN-5901-1
https://www.cve.org/CVERecord?id=CVE-2023-0361
|
| gnutls-dane |
CVE-2023-5981 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0155
https://access.redhat.com/errata/RHSA-2024:0319
https://access.redhat.com/errata/RHSA-2024:0399
https://access.redhat.com/errata/RHSA-2024:0451
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/security/cve/CVE-2023-5981
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2248445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://errata.rockylinux.org/RLSA-2024:0155
https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
https://linux.oracle.com/cve/CVE-2023-5981.html
https://linux.oracle.com/errata/ELSA-2024-0533.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html
https://nvd.nist.gov/vuln/detail/CVE-2023-5981
https://ubuntu.com/security/notices/USN-6499-1
https://ubuntu.com/security/notices/USN-6499-2
https://www.cve.org/CVERecord?id=CVE-2023-5981
|
| gnutls-dane |
CVE-2024-0553 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/errata/RHSA-2024:0627
https://access.redhat.com/errata/RHSA-2024:0796
https://access.redhat.com/errata/RHSA-2024:1082
https://access.redhat.com/security/cve/CVE-2024-0553
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2258412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://errata.rockylinux.org/RLSA-2024:0627
https://gitlab.com/gnutls/gnutls/-/issues/1522
https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-14
https://linux.oracle.com/cve/CVE-2024-0553.html
https://linux.oracle.com/errata/ELSA-2024-12135.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
https://nvd.nist.gov/vuln/detail/CVE-2024-0553
https://security.netapp.com/advisory/ntap-20240202-0011/
https://ubuntu.com/security/notices/USN-6593-1
https://www.cve.org/CVERecord?id=CVE-2024-0553
|
| gnutls-dane |
CVE-2024-0567 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/errata/RHSA-2024:1082
https://access.redhat.com/security/cve/CVE-2024-0567
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2258544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://gitlab.com/gnutls/gnutls/-/issues/1521
https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-09
https://linux.oracle.com/cve/CVE-2024-0567.html
https://linux.oracle.com/errata/ELSA-2024-0533.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
https://nvd.nist.gov/vuln/detail/CVE-2024-0567
https://security.netapp.com/advisory/ntap-20240202-0011/
https://ubuntu.com/security/notices/USN-6593-1
https://www.cve.org/CVERecord?id=CVE-2024-0567
|
| gnutls-dane |
CVE-2015-0294 |
LOW |
3.3.29-9.el7_6 |
|
http://lists.gnutls.org/pipermail/gnutls-devel/2015-February/007471.html
http://www.debian.org/security/2015/dsa-3191
https://access.redhat.com/security/cve/CVE-2015-0294
https://bugzilla.redhat.com/show_bug.cgi?id=1196323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294
https://gitlab.com/gnutls/gnutls/commit/6e76e9b9fa845b76b0b9a45f05f4b54a052578ff
https://linux.oracle.com/cve/CVE-2015-0294.html
https://linux.oracle.com/errata/ELSA-2015-1457.html
https://nvd.nist.gov/vuln/detail/CVE-2015-0294
https://ubuntu.com/security/notices/USN-2540-1
https://www.cve.org/CVERecord?id=CVE-2015-0294
|
| gnutls-dane |
CVE-2021-4209 |
LOW |
3.3.29-9.el7_6 |
|
https://access.redhat.com/security/cve/CVE-2021-4209
https://bugzilla.redhat.com/show_bug.cgi?id=2044156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209
https://gitlab.com/gnutls/gnutls/-/commit/3db352734472d851318944db13be73da61300568
https://gitlab.com/gnutls/gnutls/-/issues/1306
https://gitlab.com/gnutls/gnutls/-/merge_requests/1503
https://nvd.nist.gov/vuln/detail/CVE-2021-4209
https://security.netapp.com/advisory/ntap-20220915-0005/
https://ubuntu.com/security/notices/USN-5550-1
https://ubuntu.com/security/notices/USN-5750-1
https://www.cve.org/CVERecord?id=CVE-2021-4209
|
| gnutls-devel |
CVE-2014-3566 |
HIGH |
3.3.29-9.el7_6 |
|
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
http://advisories.mageia.org/MGASA-2014-0416.html
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
http://askubuntu.com/a/537196
http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
http://downloads.asterisk.org/pub/security/AST-2014-011.html
http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
http://marc.info/?l=bugtraq&m=141450452204552&w=2
http://marc.info/?l=bugtraq&m=141450973807288&w=2
http://marc.info/?l=bugtraq&m=141477196830952&w=2
http://marc.info/?l=bugtraq&m=141576815022399&w=2
http://marc.info/?l=bugtraq&m=141577087123040&w=2
http://marc.info/?l=bugtraq&m=141577350823734&w=2
http://marc.info/?l=bugtraq&m=141620103726640&w=2
http://marc.info/?l=bugtraq&m=141628688425177&w=2
http://marc.info/?l=bugtraq&m=141694355519663&w=2
http://marc.info/?l=bugtraq&m=141697638231025&w=2
http://marc.info/?l=bugtraq&m=141697676231104&w=2
http://marc.info/?l=bugtraq&m=141703183219781&w=2
http://marc.info/?l=bugtraq&m=141715130023061&w=2
http://marc.info/?l=bugtraq&m=141775427104070&w=2
http://marc.info/?l=bugtraq&m=141813976718456&w=2
http://marc.info/?l=bugtraq&m=141814011518700&w=2
http://marc.info/?l=bugtraq&m=141879378918327&w=2
http://marc.info/?l=bugtraq&m=142103967620673&w=2
http://marc.info/?l=bugtraq&m=142118135300698&w=2
http://marc.info/?l=bugtraq&m=142296755107581&w=2
http://marc.info/?l=bugtraq&m=142350196615714&w=2
http://marc.info/?l=bugtraq&m=142350298616097&w=2
http://marc.info/?l=bugtraq&m=142350743917559&w=2
http://marc.info/?l=bugtraq&m=142354438527235&w=2
http://marc.info/?l=bugtraq&m=142357976805598&w=2
http://marc.info/?l=bugtraq&m=142495837901899&w=2
http://marc.info/?l=bugtraq&m=142496355704097&w=2
http://marc.info/?l=bugtraq&m=142546741516006&w=2
http://marc.info/?l=bugtraq&m=142607790919348&w=2
http://marc.info/?l=bugtraq&m=142624590206005&w=2
http://marc.info/?l=bugtraq&m=142624619906067
http://marc.info/?l=bugtraq&m=142624619906067&w=2
http://marc.info/?l=bugtraq&m=142624679706236&w=2
http://marc.info/?l=bugtraq&m=142624719706349&w=2
http://marc.info/?l=bugtraq&m=142660345230545&w=2
http://marc.info/?l=bugtraq&m=142721830231196&w=2
http://marc.info/?l=bugtraq&m=142721887231400&w=2
http://marc.info/?l=bugtraq&m=142740155824959&w=2
http://marc.info/?l=bugtraq&m=142791032306609&w=2
http://marc.info/?l=bugtraq&m=142804214608580&w=2
http://marc.info/?l=bugtraq&m=142805027510172&w=2
http://marc.info/?l=bugtraq&m=142962817202793&w=2
http://marc.info/?l=bugtraq&m=143039249603103&w=2
http://marc.info/?l=bugtraq&m=143101048219218&w=2
http://marc.info/?l=bugtraq&m=143290371927178&w=2
http://marc.info/?l=bugtraq&m=143290437727362&w=2
http://marc.info/?l=bugtraq&m=143290522027658&w=2
http://marc.info/?l=bugtraq&m=143290583027876&w=2
http://marc.info/?l=bugtraq&m=143558137709884&w=2
http://marc.info/?l=bugtraq&m=143558192010071&w=2
http://marc.info/?l=bugtraq&m=143628269912142&w=2
http://marc.info/?l=bugtraq&m=144101915224472&w=2
http://marc.info/?l=bugtraq&m=144251162130364&w=2
http://marc.info/?l=bugtraq&m=144294141001552&w=2
http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=openssl-dev&m=141333049205629&w=2
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
http://rhn.redhat.com/errata/RHSA-2014-1652.html
http://rhn.redhat.com/errata/RHSA-2014-1653.html
http://rhn.redhat.com/errata/RHSA-2014-1692.html
http://rhn.redhat.com/errata/RHSA-2014-1876.html
http://rhn.redhat.com/errata/RHSA-2014-1877.html
http://rhn.redhat.com/errata/RHSA-2014-1880.html
http://rhn.redhat.com/errata/RHSA-2014-1881.html
http://rhn.redhat.com/errata/RHSA-2014-1882.html
http://rhn.redhat.com/errata/RHSA-2014-1920.html
http://rhn.redhat.com/errata/RHSA-2014-1948.html
http://rhn.redhat.com/errata/RHSA-2015-0068.html
http://rhn.redhat.com/errata/RHSA-2015-0079.html
http://rhn.redhat.com/errata/RHSA-2015-0080.html
http://rhn.redhat.com/errata/RHSA-2015-0085.html
http://rhn.redhat.com/errata/RHSA-2015-0086.html
http://rhn.redhat.com/errata/RHSA-2015-0264.html
http://rhn.redhat.com/errata/RHSA-2015-0698.html
http://rhn.redhat.com/errata/RHSA-2015-1545.html
http://rhn.redhat.com/errata/RHSA-2015-1546.html
http://secunia.com/advisories/59627
http://secunia.com/advisories/60056
http://secunia.com/advisories/60206
http://secunia.com/advisories/60792
http://secunia.com/advisories/60859
http://secunia.com/advisories/61019
http://secunia.com/advisories/61130
http://secunia.com/advisories/61303
http://secunia.com/advisories/61316
http://secunia.com/advisories/61345
http://secunia.com/advisories/61359
http://secunia.com/advisories/61782
http://secunia.com/advisories/61810
http://secunia.com/advisories/61819
http://secunia.com/advisories/61825
http://secunia.com/advisories/61827
http://secunia.com/advisories/61926
http://secunia.com/advisories/61995
http://support.apple.com/HT204244
http://support.citrix.com/article/CTX200238
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
http://www-01.ibm.com/support/docview.wss?uid=swg21687172
http://www-01.ibm.com/support/docview.wss?uid=swg21687611
http://www-01.ibm.com/support/docview.wss?uid=swg21688283
http://www-01.ibm.com/support/docview.wss?uid=swg21692299
http://www.debian.org/security/2014/dsa-3053
http://www.debian.org/security/2015/dsa-3144
http://www.debian.org/security/2015/dsa-3147
http://www.debian.org/security/2015/dsa-3253
http://www.debian.org/security/2016/dsa-3489
http://www.kb.cert.org/vuls/id/577193
http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/archive/1/533724/100/0/threaded
http://www.securityfocus.com/archive/1/533746
http://www.securityfocus.com/archive/1/533747
http://www.securityfocus.com/bid/70574
http://www.securitytracker.com/id/1031029
http://www.securitytracker.com/id/1031039
http://www.securitytracker.com/id/1031085
http://www.securitytracker.com/id/1031086
http://www.securitytracker.com/id/1031087
http://www.securitytracker.com/id/1031088
http://www.securitytracker.com/id/1031089
http://www.securitytracker.com/id/1031090
http://www.securitytracker.com/id/1031091
http://www.securitytracker.com/id/1031092
http://www.securitytracker.com/id/1031093
http://www.securitytracker.com/id/1031094
http://www.securitytracker.com/id/1031095
http://www.securitytracker.com/id/1031096
http://www.securitytracker.com/id/1031105
http://www.securitytracker.com/id/1031106
http://www.securitytracker.com/id/1031107
http://www.securitytracker.com/id/1031120
http://www.securitytracker.com/id/1031123
http://www.securitytracker.com/id/1031124
http://www.securitytracker.com/id/1031130
http://www.securitytracker.com/id/1031131
http://www.securitytracker.com/id/1031132
http://www.ubuntu.com/usn/USN-2486-1
http://www.ubuntu.com/usn/USN-2487-1
http://www.us-cert.gov/ncas/alerts/TA14-290A
http://www.vmware.com/security/advisories/VMSA-2015-0003.html
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
https://access.redhat.com/articles/1232123
https://access.redhat.com/security/cve/CVE-2014-3566
https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
https://bto.bluecoat.com/security-advisory/sa83
https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
https://bugzilla.redhat.com/show_bug.cgi?id=1152789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
https://github.com/mpgn/poodle-PoC
https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kc.mcafee.com/corporate/index?page=content&id=SB10090
https://kc.mcafee.com/corporate/index?page=content&id=SB10091
https://kc.mcafee.com/corporate/index?page=content&id=SB10104
https://linux.oracle.com/cve/CVE-2014-3566.html
https://linux.oracle.com/errata/ELSA-2015-0085.html
https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-3566
https://puppet.com/security/cve/poodle-sslv3-vulnerability
https://security.gentoo.org/glsa/201507-14
https://security.gentoo.org/glsa/201606-11
https://security.netapp.com/advisory/ntap-20141015-0001/
https://support.apple.com/HT205217
https://support.apple.com/kb/HT6527
https://support.apple.com/kb/HT6529
https://support.apple.com/kb/HT6531
https://support.apple.com/kb/HT6535
https://support.apple.com/kb/HT6536
https://support.apple.com/kb/HT6541
https://support.apple.com/kb/HT6542
https://support.citrix.com/article/CTX216642
https://support.lenovo.com/product_security/poodle
https://support.lenovo.com/us/en/product_security/poodle
https://technet.microsoft.com/library/security/3009008.aspx
https://ubuntu.com/security/notices/USN-2486-1
https://ubuntu.com/security/notices/USN-2487-1
https://www-01.ibm.com/support/docview.wss?uid=swg21688165
https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
https://www.cve.org/CVERecord?id=CVE-2014-3566
https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
https://www.elastic.co/blog/logstash-1-4-3-released
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/news/secadv_20141015.txt
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://www.suse.com/support/kb/doc.php?id=7015773
|
| gnutls-devel |
CVE-2015-2808 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://nvd.nist.gov/vuln/detail/CVE-2015-2808
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
https://www.cve.org/CVERecord?id=CVE-2015-2808
https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
|
| gnutls-devel |
CVE-2015-3308 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155101.html
http://www.gnutls.org/security.html#GNUTLS-SA-2015-4
http://www.openwall.com/lists/oss-security/2015/04/15/6
http://www.openwall.com/lists/oss-security/2015/04/16/6
http://www.securityfocus.com/bid/74188
http://www.securitytracker.com/id/1033774
http://www.ubuntu.com/usn/USN-2727-1
https://access.redhat.com/security/cve/CVE-2015-3308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3308
https://gitlab.com/gnutls/gnutls/commit/053ae65403216acdb0a4e78b25ad66ee9f444f02
https://gitlab.com/gnutls/gnutls/commit/d6972be33264ecc49a86cd0958209cd7363af1e9
https://nvd.nist.gov/vuln/detail/CVE-2015-3308
https://security.gentoo.org/glsa/201506-03
https://ubuntu.com/security/notices/USN-2727-1
https://www.cve.org/CVERecord?id=CVE-2015-3308
|
| gnutls-devel |
CVE-2015-6251 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165286.html
http://lists.opensuse.org/opensuse-updates/2015-09/msg00001.html
http://www.debian.org/security/2015/dsa-3334
http://www.gnutls.org/security.html#GNUTLS-SA-2015-3
http://www.openwall.com/lists/oss-security/2015/08/10/1
http://www.openwall.com/lists/oss-security/2015/08/17/6
http://www.securityfocus.com/bid/76267
http://www.securitytracker.com/id/1033226
https://access.redhat.com/security/cve/CVE-2015-6251
https://bugzilla.redhat.com/show_bug.cgi?id=1251902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
https://gitlab.com/gnutls/gnutls/commit/272854367efc130fbd4f1a51840d80c630214e12
https://nvd.nist.gov/vuln/detail/CVE-2015-6251
https://ubuntu.com/security/notices/USN-2727-1
https://www.cve.org/CVERecord?id=CVE-2015-6251
|
| gnutls-devel |
CVE-2016-8610 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://rhn.redhat.com/errata/RHSA-2017-0286.html
http://rhn.redhat.com/errata/RHSA-2017-0574.html
http://rhn.redhat.com/errata/RHSA-2017-1415.html
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://seclists.org/oss-sec/2016/q4/224
http://security.360.cn/cve/CVE-2016-8610
http://security.360.cn/cve/CVE-2016-8610/
http://www.openwall.com/lists/oss-security/2016/10/24/3
http://www.securityfocus.com/bid/93841
http://www.securitytracker.com/id/1037084
https://access.redhat.com/errata/RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1658
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/security/cve/CVE-2016-8610
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401
https://linux.oracle.com/cve/CVE-2016-8610.html
https://linux.oracle.com/errata/ELSA-2017-0574.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8610
https://security.360.cn/cve/CVE-2016-8610/
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:35.openssl.asc
https://security.netapp.com/advisory/ntap-20171130-0001/
https://security.paloaltonetworks.com/CVE-2016-8610
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03897en_us
https://ubuntu.com/security/notices/USN-3181-1
https://ubuntu.com/security/notices/USN-3183-1
https://ubuntu.com/security/notices/USN-3183-2
https://www.cve.org/CVERecord?id=CVE-2016-8610
https://www.debian.org/security/2017/dsa-3773
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| gnutls-devel |
CVE-2018-16868 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://cat.eyalro.net/
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00068.html
http://www.securityfocus.com/bid/106080
https://access.redhat.com/security/cve/CVE-2018-16868
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
https://nvd.nist.gov/vuln/detail/CVE-2018-16868
https://www.cve.org/CVERecord?id=CVE-2018-16868
|
| gnutls-devel |
CVE-2022-2509 |
MEDIUM |
3.3.29-9.el7_6 |
|
https://access.redhat.com/errata/RHSA-2022:6854
https://access.redhat.com/security/cve/CVE-2022-2509
https://bugzilla.redhat.com/2108977
https://bugzilla.redhat.com/show_bug.cgi?id=2076626
https://bugzilla.redhat.com/show_bug.cgi?id=2108635
https://bugzilla.redhat.com/show_bug.cgi?id=2108977
https://bugzilla.redhat.com/show_bug.cgi?id=2119770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
https://errata.almalinux.org/9/ALSA-2022-6854.html
https://errata.rockylinux.org/RLSA-2022:6854
https://gnutls.org/security-new.html (GNUTLS-SA-2022-07-07)
https://gnutls.org/security-new.html#GNUTLS-SA-2022-07-07
https://linux.oracle.com/cve/CVE-2022-2509.html
https://linux.oracle.com/errata/ELSA-2022-7105.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00002.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/
https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
https://nvd.nist.gov/vuln/detail/CVE-2022-2509
https://ubuntu.com/security/notices/USN-5550-1
https://www.cve.org/CVERecord?id=CVE-2022-2509
https://www.debian.org/security/2022/dsa-5203
|
| gnutls-devel |
CVE-2023-0361 |
MEDIUM |
3.3.29-9.el7_6 |
|
https://access.redhat.com/errata/RHSA-2023:1141
https://access.redhat.com/security/cve/CVE-2023-0361
https://bugzilla.redhat.com/2162596
https://bugzilla.redhat.com/show_bug.cgi?id=2144537
https://bugzilla.redhat.com/show_bug.cgi?id=2149640
https://bugzilla.redhat.com/show_bug.cgi?id=2162596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361
https://errata.almalinux.org/9/ALSA-2023-1141.html
https://errata.rockylinux.org/RLSA-2023:1141
https://github.com/tlsfuzzer/tlsfuzzer/pull/679
https://gitlab.com/gnutls/gnutls/-/issues/1050
https://gnutls.org/security-new.html#GNUTLS-SA-2020-07-14
https://linux.oracle.com/cve/CVE-2023-0361.html
https://linux.oracle.com/errata/ELSA-2023-1569.html
https://lists.debian.org/debian-lts-announce/2023/02/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UFIA3X4IZ3CW7SRQ2UHNHNPMRIAWF2FI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WS4KVDOG6QTALWHC2QE4Y7VPDRMLTRWQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z634YBXAJ5VLDI62IOPBVP5K6YFHAWCY/
https://nvd.nist.gov/vuln/detail/CVE-2023-0361
https://security.netapp.com/advisory/ntap-20230324-0005/
https://security.netapp.com/advisory/ntap-20230725-0005/
https://ubuntu.com/security/notices/USN-5901-1
https://www.cve.org/CVERecord?id=CVE-2023-0361
|
| gnutls-devel |
CVE-2023-5981 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0155
https://access.redhat.com/errata/RHSA-2024:0319
https://access.redhat.com/errata/RHSA-2024:0399
https://access.redhat.com/errata/RHSA-2024:0451
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/security/cve/CVE-2023-5981
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2248445
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://errata.rockylinux.org/RLSA-2024:0155
https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
https://linux.oracle.com/cve/CVE-2023-5981.html
https://linux.oracle.com/errata/ELSA-2024-0533.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2023-November/004837.html
https://nvd.nist.gov/vuln/detail/CVE-2023-5981
https://ubuntu.com/security/notices/USN-6499-1
https://ubuntu.com/security/notices/USN-6499-2
https://www.cve.org/CVERecord?id=CVE-2023-5981
|
| gnutls-devel |
CVE-2024-0553 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/errata/RHSA-2024:0627
https://access.redhat.com/errata/RHSA-2024:0796
https://access.redhat.com/errata/RHSA-2024:1082
https://access.redhat.com/security/cve/CVE-2024-0553
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2258412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://errata.rockylinux.org/RLSA-2024:0627
https://gitlab.com/gnutls/gnutls/-/issues/1522
https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-14
https://linux.oracle.com/cve/CVE-2024-0553.html
https://linux.oracle.com/errata/ELSA-2024-12135.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
https://nvd.nist.gov/vuln/detail/CVE-2024-0553
https://security.netapp.com/advisory/ntap-20240202-0011/
https://ubuntu.com/security/notices/USN-6593-1
https://www.cve.org/CVERecord?id=CVE-2024-0553
|
| gnutls-devel |
CVE-2024-0567 |
MEDIUM |
3.3.29-9.el7_6 |
|
http://www.openwall.com/lists/oss-security/2024/01/19/3
https://access.redhat.com/errata/RHSA-2024:0533
https://access.redhat.com/errata/RHSA-2024:1082
https://access.redhat.com/security/cve/CVE-2024-0567
https://bugzilla.redhat.com/2248445
https://bugzilla.redhat.com/2258412
https://bugzilla.redhat.com/2258544
https://bugzilla.redhat.com/show_bug.cgi?id=2258544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567
https://errata.almalinux.org/9/ALSA-2024-0533.html
https://gitlab.com/gnutls/gnutls/-/issues/1521
https://gnutls.org/security-new.html#GNUTLS-SA-2024-01-09
https://linux.oracle.com/cve/CVE-2024-0567.html
https://linux.oracle.com/errata/ELSA-2024-0533.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
https://nvd.nist.gov/vuln/detail/CVE-2024-0567
https://security.netapp.com/advisory/ntap-20240202-0011/
https://ubuntu.com/security/notices/USN-6593-1
https://www.cve.org/CVERecord?id=CVE-2024-0567
|
| gnutls-devel |
CVE-2015-0294 |
LOW |
3.3.29-9.el7_6 |
|
http://lists.gnutls.org/pipermail/gnutls-devel/2015-February/007471.html
http://www.debian.org/security/2015/dsa-3191
https://access.redhat.com/security/cve/CVE-2015-0294
https://bugzilla.redhat.com/show_bug.cgi?id=1196323
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294
https://gitlab.com/gnutls/gnutls/commit/6e76e9b9fa845b76b0b9a45f05f4b54a052578ff
https://linux.oracle.com/cve/CVE-2015-0294.html
https://linux.oracle.com/errata/ELSA-2015-1457.html
https://nvd.nist.gov/vuln/detail/CVE-2015-0294
https://ubuntu.com/security/notices/USN-2540-1
https://www.cve.org/CVERecord?id=CVE-2015-0294
|
| gnutls-devel |
CVE-2021-4209 |
LOW |
3.3.29-9.el7_6 |
|
https://access.redhat.com/security/cve/CVE-2021-4209
https://bugzilla.redhat.com/show_bug.cgi?id=2044156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209
https://gitlab.com/gnutls/gnutls/-/commit/3db352734472d851318944db13be73da61300568
https://gitlab.com/gnutls/gnutls/-/issues/1306
https://gitlab.com/gnutls/gnutls/-/merge_requests/1503
https://nvd.nist.gov/vuln/detail/CVE-2021-4209
https://security.netapp.com/advisory/ntap-20220915-0005/
https://ubuntu.com/security/notices/USN-5550-1
https://ubuntu.com/security/notices/USN-5750-1
https://www.cve.org/CVERecord?id=CVE-2021-4209
|
| gpgme |
CVE-2014-3564 |
LOW |
1.3.2-5.el7 |
|
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git%3Ba=commit%3Bh=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77
http://seclists.org/oss-sec/2014/q3/266
http://www.debian.org/security/2014/dsa-3005
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.osvdb.org/109699
http://www.securityfocus.com/bid/68990
https://access.redhat.com/security/cve/CVE-2014-3564
https://bugzilla.redhat.com/show_bug.cgi?id=1113267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564
https://nvd.nist.gov/vuln/detail/CVE-2014-3564
https://ubuntu.com/security/notices/USN-2307-1
https://www.cve.org/CVERecord?id=CVE-2014-3564
|
| java-1.8.0-openjdk |
CVE-2016-3587 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91904
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/security/cve/CVE-2016-3587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3587
https://linux.oracle.com/cve/CVE-2016-3587.html
https://linux.oracle.com/errata/ELSA-2016-1458.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3587
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://www.cve.org/CVERecord?id=CVE-2016-3587
|
| java-1.8.0-openjdk |
CVE-2016-3598 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://rhn.redhat.com/errata/RHSA-2016-1587.html
http://rhn.redhat.com/errata/RHSA-2016-1588.html
http://rhn.redhat.com/errata/RHSA-2016-1589.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91918
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-3598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
https://linux.oracle.com/cve/CVE-2016-3598.html
https://linux.oracle.com/errata/ELSA-2016-1504.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3598
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://www.cve.org/CVERecord?id=CVE-2016-3598
|
| java-1.8.0-openjdk |
CVE-2016-3606 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://rhn.redhat.com/errata/RHSA-2016-1776.html
http://www.debian.org/security/2016/dsa-3641
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91912
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
http://www.ubuntu.com/usn/USN-3077-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/errata/RHSA-2016:1476
https://access.redhat.com/security/cve/CVE-2016-3606
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-3606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
https://linux.oracle.com/cve/CVE-2016-3606.html
https://linux.oracle.com/errata/ELSA-2016-1776.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3606
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://ubuntu.com/security/notices/USN-3077-1
https://www.cve.org/CVERecord?id=CVE-2016-3606
|
| java-1.8.0-openjdk |
CVE-2016-3610 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91930
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/security/cve/CVE-2016-3610
https://bugzilla.redhat.com/show_bug.cgi?id=1356994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
https://linux.oracle.com/cve/CVE-2016-3610.html
https://linux.oracle.com/errata/ELSA-2016-1504.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3610
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://www.cve.org/CVERecord?id=CVE-2016-3610
|
| java-1.8.0-openjdk |
CVE-2016-5582 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.111-1.b15.el7_2 |
http://hg.openjdk.java.net/jdk8u/jdk8u/hotspot/rev/a3ede966ecfe
http://rhn.redhat.com/errata/RHSA-2016-2079.html
http://rhn.redhat.com/errata/RHSA-2016-2088.html
http://rhn.redhat.com/errata/RHSA-2016-2089.html
http://rhn.redhat.com/errata/RHSA-2016-2090.html
http://rhn.redhat.com/errata/RHSA-2016-2658.html
http://rhn.redhat.com/errata/RHSA-2017-0061.html
http://www.debian.org/security/2016/dsa-3707
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
http://www.securityfocus.com/bid/93623
http://www.securitytracker.com/id/1037040
http://www.ubuntu.com/usn/USN-3130-1
http://www.ubuntu.com/usn/USN-3154-1
https://access.redhat.com/security/cve/CVE-2016-5582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582
https://linux.oracle.com/cve/CVE-2016-5582.html
https://linux.oracle.com/errata/ELSA-2017-0061.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-5582
https://security.gentoo.org/glsa/201611-04
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20161019-0001/
https://ubuntu.com/security/notices/USN-3121-1
https://ubuntu.com/security/notices/USN-3130-1
https://ubuntu.com/security/notices/USN-3154-1
https://www.cve.org/CVERecord?id=CVE-2016-5582
|
| java-1.8.0-openjdk |
CVE-2017-10074 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99731
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/security/cve/CVE-2017-10074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
https://linux.oracle.com/cve/CVE-2017-10074.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10074
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10074
|
| java-1.8.0-openjdk |
CVE-2017-10087 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99703
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
https://linux.oracle.com/cve/CVE-2017-10087.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10087
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10087
|
| java-1.8.0-openjdk |
CVE-2017-10089 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99659
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
https://linux.oracle.com/cve/CVE-2017-10089.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10089
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10089
|
| java-1.8.0-openjdk |
CVE-2017-10090 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99706
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
https://linux.oracle.com/cve/CVE-2017-10090.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10090
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10090
|
| java-1.8.0-openjdk |
CVE-2017-10096 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99670
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
https://linux.oracle.com/cve/CVE-2017-10096.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10096
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10096
|
| java-1.8.0-openjdk |
CVE-2017-10101 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99674
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
https://linux.oracle.com/cve/CVE-2017-10101.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10101
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10101
|
| java-1.8.0-openjdk |
CVE-2017-10102 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99712
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10102
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
https://linux.oracle.com/cve/CVE-2017-10102.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10102
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10102
|
| java-1.8.0-openjdk |
CVE-2017-10107 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99719
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
https://linux.oracle.com/cve/CVE-2017-10107.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10107
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10107
|
| java-1.8.0-openjdk |
CVE-2017-10110 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99643
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
https://linux.oracle.com/cve/CVE-2017-10110.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10110
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10110
|
| java-1.8.0-openjdk |
CVE-2017-10111 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99707
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/security/cve/CVE-2017-10111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
https://linux.oracle.com/cve/CVE-2017-10111.html
https://linux.oracle.com/errata/ELSA-2017-1789.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10111
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://www.cve.org/CVERecord?id=CVE-2017-10111
|
| java-1.8.0-openjdk |
CVE-2017-10285 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101319
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
https://linux.oracle.com/cve/CVE-2017-10285.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10285
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10285
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
|
| java-1.8.0-openjdk |
CVE-2017-10346 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101315
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
https://linux.oracle.com/cve/CVE-2017-10346.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10346
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10346
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
|
| java-1.8.0-openjdk |
CVE-2017-3241 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/09c05d3bf23e
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/75f31e0bd829
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95488
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/
https://linux.oracle.com/cve/CVE-2017-3241.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3241
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2017-3241
https://www.exploit-db.com/exploits/41145/
|
| java-1.8.0-openjdk |
CVE-2017-3272 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5b2b1dadd53c
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95533
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
https://linux.oracle.com/cve/CVE-2017-3272.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3272
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2017-3272
|
| java-1.8.0-openjdk |
CVE-2017-3289 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/hotspot/rev/02a3d0dcbedd
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95525
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
https://linux.oracle.com/cve/CVE-2017-3289.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3289
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://www.cve.org/CVERecord?id=CVE-2017-3289
|
| java-1.8.0-openjdk |
CVE-2018-2814 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103798
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/security/cve/CVE-2018-2814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2814.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2814
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2814
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk |
CVE-2018-3169 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105587
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3000
https://access.redhat.com/errata/RHSA-2018:3001
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3350
https://access.redhat.com/errata/RHSA-2018:3409
https://access.redhat.com/errata/RHSA-2018:3521
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3671
https://access.redhat.com/errata/RHSA-2018:3672
https://access.redhat.com/errata/RHSA-2018:3779
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169
https://linux.oracle.com/cve/CVE-2018-3169.html
https://linux.oracle.com/errata/ELSA-2018-3521.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3169
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://ubuntu.com/security/notices/USN-3824-1
https://usn.ubuntu.com/3804-1/
https://usn.ubuntu.com/3824-1/
https://www.cve.org/CVERecord?id=CVE-2018-3169
https://www.debian.org/security/2018/dsa-4326
|
| java-1.8.0-openjdk |
CVE-2018-3183 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105622
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3521
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183
https://linux.oracle.com/cve/CVE-2018-3183.html
https://linux.oracle.com/errata/ELSA-2018-3521.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3183
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://usn.ubuntu.com/3804-1/
https://www.cve.org/CVERecord?id=CVE-2018-3183
https://www.debian.org/security/2018/dsa-4326
|
| java-1.8.0-openjdk |
CVE-2016-5548 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/3647a1ee5681
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95559
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
https://linux.oracle.com/cve/CVE-2016-5548.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5548
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2016-5548
|
| java-1.8.0-openjdk |
CVE-2016-5573 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.111-1.b15.el7_2 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/e47a4a3f3e54
http://rhn.redhat.com/errata/RHSA-2016-2079.html
http://rhn.redhat.com/errata/RHSA-2016-2088.html
http://rhn.redhat.com/errata/RHSA-2016-2089.html
http://rhn.redhat.com/errata/RHSA-2016-2090.html
http://rhn.redhat.com/errata/RHSA-2016-2136.html
http://rhn.redhat.com/errata/RHSA-2016-2137.html
http://rhn.redhat.com/errata/RHSA-2016-2138.html
http://rhn.redhat.com/errata/RHSA-2016-2658.html
http://rhn.redhat.com/errata/RHSA-2016-2659.html
http://rhn.redhat.com/errata/RHSA-2017-0061.html
http://www.debian.org/security/2016/dsa-3707
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
http://www.securityfocus.com/bid/93628
http://www.securitytracker.com/id/1037040
http://www.ubuntu.com/usn/USN-3130-1
http://www.ubuntu.com/usn/USN-3154-1
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573
https://linux.oracle.com/cve/CVE-2016-5573.html
https://linux.oracle.com/errata/ELSA-2017-0061.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5573
https://security.gentoo.org/glsa/201611-04
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20161019-0001/
https://ubuntu.com/security/notices/USN-3121-1
https://ubuntu.com/security/notices/USN-3130-1
https://ubuntu.com/security/notices/USN-3154-1
https://www.cve.org/CVERecord?id=CVE-2016-5573
|
| java-1.8.0-openjdk |
CVE-2017-10067 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99756
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
https://linux.oracle.com/cve/CVE-2017-10067.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10067
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10067
|
| java-1.8.0-openjdk |
CVE-2017-10078 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99752
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10078
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
https://linux.oracle.com/cve/CVE-2017-10078.html
https://linux.oracle.com/errata/ELSA-2017-1789.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10078
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://www.cve.org/CVERecord?id=CVE-2017-10078
|
| java-1.8.0-openjdk |
CVE-2017-10116 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99734
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10116
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
https://linux.oracle.com/cve/CVE-2017-10116.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10116
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10116
|
| java-1.8.0-openjdk |
CVE-2017-10274 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101333
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/security/cve/CVE-2017-10274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
https://linux.oracle.com/cve/CVE-2017-10274.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10274
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10274
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
|
| java-1.8.0-openjdk |
CVE-2017-10388 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101321
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
https://linux.oracle.com/cve/CVE-2017-10388.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10388
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10388
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
https://www.orpheus-lyre.info/
https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
|
| java-1.8.0-openjdk |
CVE-2018-2582 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102597
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/security/cve/CVE-2018-2582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2582.html
https://linux.oracle.com/errata/ELSA-2018-0095.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2582
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://usn.ubuntu.com/3613-1/
https://www.cve.org/CVERecord?id=CVE-2018-2582
https://www.debian.org/security/2018/dsa-4144
|
| java-1.8.0-openjdk |
CVE-2018-2633 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102557
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2633
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2633.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2633
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2633
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2634 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102592
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2634
https://bugs.openjdk.java.net/browse/JDK-6560359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2634.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2634
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2634
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2637 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102576
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2637.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2637
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2637
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2641 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102605
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2641.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2641
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2641
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2794 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/java/javase/8u171-relnotes-4308888.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103817
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2794.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2794
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2794
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk |
CVE-2018-3149 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105608
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3000
https://access.redhat.com/errata/RHSA-2018:3001
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3007
https://access.redhat.com/errata/RHSA-2018:3008
https://access.redhat.com/errata/RHSA-2018:3350
https://access.redhat.com/errata/RHSA-2018:3409
https://access.redhat.com/errata/RHSA-2018:3521
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3671
https://access.redhat.com/errata/RHSA-2018:3672
https://access.redhat.com/errata/RHSA-2018:3779
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149
https://linux.oracle.com/cve/CVE-2018-3149.html
https://linux.oracle.com/errata/ELSA-2018-3521.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3149
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://ubuntu.com/security/notices/USN-3824-1
https://usn.ubuntu.com/3804-1/
https://usn.ubuntu.com/3824-1/
https://www.cve.org/CVERecord?id=CVE-2018-3149
https://www.debian.org/security/2018/dsa-4326
|
| java-1.8.0-openjdk |
CVE-2018-3639 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-8.b10.el7_5 |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html
http://support.lenovo.com/us/en/solutions/LEN-22133
http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html
http://www.openwall.com/lists/oss-security/2020/06/10/1
http://www.openwall.com/lists/oss-security/2020/06/10/2
http://www.openwall.com/lists/oss-security/2020/06/10/5
http://www.securityfocus.com/bid/104232
http://www.securitytracker.com/id/1040949
http://www.securitytracker.com/id/1042004
http://xenbits.xen.org/xsa/advisory-263.html
https://access.redhat.com/errata/RHSA-2018:1629
https://access.redhat.com/errata/RHSA-2018:1630
https://access.redhat.com/errata/RHSA-2018:1632
https://access.redhat.com/errata/RHSA-2018:1633
https://access.redhat.com/errata/RHSA-2018:1635
https://access.redhat.com/errata/RHSA-2018:1636
https://access.redhat.com/errata/RHSA-2018:1637
https://access.redhat.com/errata/RHSA-2018:1638
https://access.redhat.com/errata/RHSA-2018:1639
https://access.redhat.com/errata/RHSA-2018:1640
https://access.redhat.com/errata/RHSA-2018:1641
https://access.redhat.com/errata/RHSA-2018:1642
https://access.redhat.com/errata/RHSA-2018:1643
https://access.redhat.com/errata/RHSA-2018:1644
https://access.redhat.com/errata/RHSA-2018:1645
https://access.redhat.com/errata/RHSA-2018:1646
https://access.redhat.com/errata/RHSA-2018:1647
https://access.redhat.com/errata/RHSA-2018:1648
https://access.redhat.com/errata/RHSA-2018:1649
https://access.redhat.com/errata/RHSA-2018:1650
https://access.redhat.com/errata/RHSA-2018:1651
https://access.redhat.com/errata/RHSA-2018:1652
https://access.redhat.com/errata/RHSA-2018:1653
https://access.redhat.com/errata/RHSA-2018:1654
https://access.redhat.com/errata/RHSA-2018:1655
https://access.redhat.com/errata/RHSA-2018:1656
https://access.redhat.com/errata/RHSA-2018:1657
https://access.redhat.com/errata/RHSA-2018:1658
https://access.redhat.com/errata/RHSA-2018:1659
https://access.redhat.com/errata/RHSA-2018:1660
https://access.redhat.com/errata/RHSA-2018:1661
https://access.redhat.com/errata/RHSA-2018:1662
https://access.redhat.com/errata/RHSA-2018:1663
https://access.redhat.com/errata/RHSA-2018:1664
https://access.redhat.com/errata/RHSA-2018:1665
https://access.redhat.com/errata/RHSA-2018:1666
https://access.redhat.com/errata/RHSA-2018:1667
https://access.redhat.com/errata/RHSA-2018:1668
https://access.redhat.com/errata/RHSA-2018:1669
https://access.redhat.com/errata/RHSA-2018:1674
https://access.redhat.com/errata/RHSA-2018:1675
https://access.redhat.com/errata/RHSA-2018:1676
https://access.redhat.com/errata/RHSA-2018:1686
https://access.redhat.com/errata/RHSA-2018:1688
https://access.redhat.com/errata/RHSA-2018:1689
https://access.redhat.com/errata/RHSA-2018:1690
https://access.redhat.com/errata/RHSA-2018:1696
https://access.redhat.com/errata/RHSA-2018:1710
https://access.redhat.com/errata/RHSA-2018:1711
https://access.redhat.com/errata/RHSA-2018:1737
https://access.redhat.com/errata/RHSA-2018:1738
https://access.redhat.com/errata/RHSA-2018:1826
https://access.redhat.com/errata/RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2018:1965
https://access.redhat.com/errata/RHSA-2018:1967
https://access.redhat.com/errata/RHSA-2018:1997
https://access.redhat.com/errata/RHSA-2018:2001
https://access.redhat.com/errata/RHSA-2018:2003
https://access.redhat.com/errata/RHSA-2018:2006
https://access.redhat.com/errata/RHSA-2018:2060
https://access.redhat.com/errata/RHSA-2018:2161
https://access.redhat.com/errata/RHSA-2018:2162
https://access.redhat.com/errata/RHSA-2018:2164
https://access.redhat.com/errata/RHSA-2018:2171
https://access.redhat.com/errata/RHSA-2018:2172
https://access.redhat.com/errata/RHSA-2018:2216
https://access.redhat.com/errata/RHSA-2018:2228
https://access.redhat.com/errata/RHSA-2018:2246
https://access.redhat.com/errata/RHSA-2018:2250
https://access.redhat.com/errata/RHSA-2018:2258
https://access.redhat.com/errata/RHSA-2018:2289
https://access.redhat.com/errata/RHSA-2018:2309
https://access.redhat.com/errata/RHSA-2018:2328
https://access.redhat.com/errata/RHSA-2018:2363
https://access.redhat.com/errata/RHSA-2018:2364
https://access.redhat.com/errata/RHSA-2018:2387
https://access.redhat.com/errata/RHSA-2018:2394
https://access.redhat.com/errata/RHSA-2018:2396
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3396
https://access.redhat.com/errata/RHSA-2018:3397
https://access.redhat.com/errata/RHSA-2018:3398
https://access.redhat.com/errata/RHSA-2018:3399
https://access.redhat.com/errata/RHSA-2018:3400
https://access.redhat.com/errata/RHSA-2018:3401
https://access.redhat.com/errata/RHSA-2018:3402
https://access.redhat.com/errata/RHSA-2018:3407
https://access.redhat.com/errata/RHSA-2018:3423
https://access.redhat.com/errata/RHSA-2018:3424
https://access.redhat.com/errata/RHSA-2018:3425
https://access.redhat.com/errata/RHSA-2019:0148
https://access.redhat.com/errata/RHSA-2019:1046
https://access.redhat.com/security/cve/CVE-2018-3639
https://access.redhat.com/security/vulnerabilities/ssbd
https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-3639.html
https://linux.oracle.com/errata/ELSA-2019-4585.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3639
https://nvidia.custhelp.com/app/answers/detail/a_id/4787
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004
https://seclists.org/bugtraq/2019/Jun/36
https://security.netapp.com/advisory/ntap-20180521-0001/
https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf
https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf
https://support.citrix.com/article/CTX235225
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us
https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel
https://ubuntu.com/security/notices/USN-3651-1
https://ubuntu.com/security/notices/USN-3652-1
https://ubuntu.com/security/notices/USN-3653-1
https://ubuntu.com/security/notices/USN-3653-2
https://ubuntu.com/security/notices/USN-3654-1
https://ubuntu.com/security/notices/USN-3654-2
https://ubuntu.com/security/notices/USN-3655-1
https://ubuntu.com/security/notices/USN-3655-2
https://ubuntu.com/security/notices/USN-3679-1
https://ubuntu.com/security/notices/USN-3680-1
https://ubuntu.com/security/notices/USN-3756-1
https://ubuntu.com/security/notices/USN-3777-3
https://usn.ubuntu.com/3651-1/
https://usn.ubuntu.com/3652-1/
https://usn.ubuntu.com/3653-1/
https://usn.ubuntu.com/3653-2/
https://usn.ubuntu.com/3654-1/
https://usn.ubuntu.com/3654-2/
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
https://usn.ubuntu.com/3679-1/
https://usn.ubuntu.com/3680-1/
https://usn.ubuntu.com/3756-1/
https://usn.ubuntu.com/3777-3/
https://www.cve.org/CVERecord?id=CVE-2018-3639
https://www.debian.org/security/2018/dsa-4210
https://www.debian.org/security/2018/dsa-4273
https://www.exploit-db.com/exploits/44695/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
https://www.kb.cert.org/vuls/id/180049
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.synology.com/support/security/Synology_SA_18_23
https://www.us-cert.gov/ncas/alerts/TA18-141A
|
| java-1.8.0-openjdk |
CVE-2019-2698 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.212.b04-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://access.redhat.com/errata/RHBA-2019:0959
https://access.redhat.com/errata/RHSA-2019:1146
https://access.redhat.com/errata/RHSA-2019:1163
https://access.redhat.com/errata/RHSA-2019:1164
https://access.redhat.com/errata/RHSA-2019:1165
https://access.redhat.com/errata/RHSA-2019:1166
https://access.redhat.com/errata/RHSA-2019:1238
https://access.redhat.com/errata/RHSA-2019:1325
https://access.redhat.com/security/cve/CVE-2019-2698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2698
https://linux.oracle.com/cve/CVE-2019-2698.html
https://linux.oracle.com/errata/ELSA-2019-1146.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2698
https://seclists.org/bugtraq/2019/May/75
https://security.gentoo.org/glsa/201908-10
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us
https://ubuntu.com/security/notices/USN-3975-1
https://usn.ubuntu.com/3975-1/
https://www.cve.org/CVERecord?id=CVE-2019-2698
https://www.debian.org/security/2019/dsa-4453
|
| java-1.8.0-openjdk |
CVE-2019-2949 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/security/cve/CVE-2019-2949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2019-2949.html
https://linux.oracle.com/errata/ELSA-2019-3136.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2949
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://support.f5.com/csp/article/K54213762?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2949
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk |
CVE-2020-14583 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
https://linux-qa.oracle.com/cve/CVE-2020-14583.html
https://linux-qa.oracle.com/errata/ELSA-2020-5807.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
https://nvd.nist.gov/vuln/detail/CVE-2020-14583
https://security.gentoo.org/glsa/202008-24
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4433-1
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4433-1/
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14583
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk |
CVE-2020-14593 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
https://linux.oracle.com/cve/CVE-2020-14593.html
https://linux.oracle.com/errata/ELSA-2020-2985.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
https://nvd.nist.gov/vuln/detail/CVE-2020-14593
https://security.gentoo.org/glsa/202008-24
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4433-1
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4433-1/
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14593
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2601 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0157
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0232
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
https://linux.oracle.com/cve/CVE-2020-2601.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2601
https://seclists.org/bugtraq/2020/Feb/22
https://seclists.org/bugtraq/2020/Jan/24
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2601
https://www.debian.org/security/2020/dsa-4605
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2604 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0232
https://access.redhat.com/errata/RHSA-2020:0465
https://access.redhat.com/errata/RHSA-2020:0467
https://access.redhat.com/errata/RHSA-2020:0468
https://access.redhat.com/errata/RHSA-2020:0469
https://access.redhat.com/errata/RHSA-2020:0470
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2020-2604.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2604
https://seclists.org/bugtraq/2020/Feb/22
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2604
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.oracle.com/technetwork/java/javase/11-0-6-oracle-relnotes-5813175.html
https://www.oracle.com/technetwork/java/javase/13-0-2-relnotes-5812268.html
https://www.oracle.com/technetwork/java/javase/8u241-relnotes-5813177.html
https://www.oracle.com/technetwork/java/javaseproducts/documentation/javase7supportreleasenotes-1601161.html#R170_251
|
| java-1.8.0-openjdk |
CVE-2020-2803 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
https://linux.oracle.com/cve/CVE-2020-2803.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2803
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2803
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2805 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
https://linux.oracle.com/cve/CVE-2020-2805.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2805
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2805
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk |
CVE-2021-2388 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.302.b08-0.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json
https://access.redhat.com/security/cve/CVE-2021-2388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
https://linux.oracle.com/cve/CVE-2021-2388.html
https://linux.oracle.com/errata/ELSA-2021-2845.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2021-2388
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20210723-0002/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-2388
https://www.debian.org/security/2021/dsa-4946
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2021-35565 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35588.json
https://access.redhat.com/security/cve/CVE-2021-35565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
https://linux.oracle.com/cve/CVE-2021-35565.html
https://linux.oracle.com/errata/ELSA-2021-3893.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
https://nvd.nist.gov/vuln/detail/CVE-2021-35565
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35565
https://www.debian.org/security/2021/dsa-5000
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2021-35567 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
https://linux.oracle.com/cve/CVE-2021-35567.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://nvd.nist.gov/vuln/detail/CVE-2021-35567
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35567
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2022-21476 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.332.b09-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
https://access.redhat.com/security/cve/CVE-2022-21476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
https://errata.almalinux.org/8/ALSA-2022-1491.html
https://linux.oracle.com/cve/CVE-2022-21476.html
https://linux.oracle.com/errata/ELSA-2022-2137.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21476
https://security.netapp.com/advisory/ntap-20220429-0006/
https://ubuntu.com/security/notices/USN-5388-1
https://ubuntu.com/security/notices/USN-5388-2
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21476
https://www.debian.org/security/2022/dsa-5128
https://www.debian.org/security/2022/dsa-5131
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| java-1.8.0-openjdk |
CVE-2022-34169 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.342.b07-1.el7_9 |
http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
http://www.openwall.com/lists/oss-security/2022/07/19/5
http://www.openwall.com/lists/oss-security/2022/07/19/6
http://www.openwall.com/lists/oss-security/2022/07/20/2
http://www.openwall.com/lists/oss-security/2022/07/20/3
http://www.openwall.com/lists/oss-security/2022/10/18/2
http://www.openwall.com/lists/oss-security/2022/11/04/8
http://www.openwall.com/lists/oss-security/2022/11/07/2
https://access.redhat.com/errata/RHSA-2022:5736
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21549.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
https://access.redhat.com/security/cve/CVE-2022-34169
https://bugzilla.redhat.com/2108540
https://bugzilla.redhat.com/2108543
https://bugzilla.redhat.com/2108547
https://bugzilla.redhat.com/2108554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
https://errata.almalinux.org/9/ALSA-2022-5736.html
https://gitbox.apache.org/repos/asf?p=xalan-java.git
https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81
https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573
https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21
https://github.com/openjdk/jdk/commit/41ef2b249073450172e11163a4d05762364b1297
https://linux.oracle.com/cve/CVE-2022-34169.html
https://linux.oracle.com/errata/ELSA-2022-5736.html
https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471
https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
https://marc.info/?l=oss-security&m=165825217622132
https://nvd.nist.gov/vuln/detail/CVE-2022-34169
https://openjdk.org/groups/vulnerability/advisories/2022-07-19
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20220729-0009
https://security.netapp.com/advisory/ntap-20220729-0009/
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-34169
https://www.debian.org/security/2022/dsa-5188
https://www.debian.org/security/2022/dsa-5192
https://www.debian.org/security/2022/dsa-5256
https://www.oracle.com/security-alerts/cpujul2022.html
https://xalan.apache.org
|
| java-1.8.0-openjdk |
CVE-2023-21930 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21930
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21930.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21930
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21930
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk |
CVE-2024-20918 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.402.b06-1.el7_9 |
https://access.redhat.com/errata/RHSA-2024:0267
https://access.redhat.com/security/cve/CVE-2024-20918
https://bugzilla.redhat.com/2257720
https://bugzilla.redhat.com/2257728
https://bugzilla.redhat.com/2257837
https://bugzilla.redhat.com/2257853
https://bugzilla.redhat.com/2257859
https://bugzilla.redhat.com/2257874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
https://errata.almalinux.org/9/ALSA-2024-0267.html
https://linux.oracle.com/cve/CVE-2024-20918.html
https://linux.oracle.com/errata/ELSA-2024-0267.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2024-20918
https://security.netapp.com/advisory/ntap-20240201-0002/
https://ubuntu.com/security/notices/USN-6660-1
https://ubuntu.com/security/notices/USN-6661-1
https://ubuntu.com/security/notices/USN-6662-1
https://www.cve.org/CVERecord?id=CVE-2024-20918
https://www.oracle.com/security-alerts/cpujan2024.html
https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA
|
| java-1.8.0-openjdk |
CVE-2024-20952 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.402.b06-1.el7_9 |
https://access.redhat.com/errata/RHSA-2024:0267
https://access.redhat.com/security/cve/CVE-2024-20952
https://bugzilla.redhat.com/2257720
https://bugzilla.redhat.com/2257728
https://bugzilla.redhat.com/2257837
https://bugzilla.redhat.com/2257853
https://bugzilla.redhat.com/2257859
https://bugzilla.redhat.com/2257874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
https://errata.almalinux.org/9/ALSA-2024-0267.html
https://linux.oracle.com/cve/CVE-2024-20952.html
https://linux.oracle.com/errata/ELSA-2024-0267.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2024-20952
https://security.netapp.com/advisory/ntap-20240201-0002/
https://ubuntu.com/security/notices/USN-6660-1
https://ubuntu.com/security/notices/USN-6661-1
https://ubuntu.com/security/notices/USN-6662-1
https://www.cve.org/CVERecord?id=CVE-2024-20952
https://www.oracle.com/security-alerts/cpujan2024.html
https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA
|
| java-1.8.0-openjdk |
CVE-2016-10165 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.111-1.b15.el7_2 |
http://lists.opensuse.org/opensuse-updates/2017-01/msg00174.html
http://rhn.redhat.com/errata/RHSA-2016-2079.html
http://rhn.redhat.com/errata/RHSA-2016-2658.html
http://www.debian.org/security/2017/dsa-3774
http://www.openwall.com/lists/oss-security/2016/08/15/9
http://www.openwall.com/lists/oss-security/2017/01/23/1
http://www.openwall.com/lists/oss-security/2017/01/25/14
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/95808
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2016-10165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10165
https://github.com/mm2/Little-CMS/commit/5ca71a7bc18b6897ab21d815d15e218e204581e2
https://nvd.nist.gov/vuln/detail/CVE-2016-10165
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3770-1
https://ubuntu.com/security/notices/USN-3770-2
https://usn.ubuntu.com/3770-1/
https://usn.ubuntu.com/3770-2/
https://www.cve.org/CVERecord?id=CVE-2016-10165
|
| java-1.8.0-openjdk |
CVE-2016-3458 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://rhn.redhat.com/errata/RHSA-2016-1776.html
http://www.debian.org/security/2016/dsa-3641
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91945
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
http://www.ubuntu.com/usn/USN-3077-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/errata/RHSA-2016:1476
https://access.redhat.com/errata/RHSA-2016:1477
https://access.redhat.com/security/cve/CVE-2016-3458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
https://linux.oracle.com/cve/CVE-2016-3458.html
https://linux.oracle.com/errata/ELSA-2016-1776.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3458
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://ubuntu.com/security/notices/USN-3077-1
https://www.cve.org/CVERecord?id=CVE-2016-3458
|
| java-1.8.0-openjdk |
CVE-2016-3500 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://rhn.redhat.com/errata/RHSA-2016-1776.html
http://www.debian.org/security/2016/dsa-3641
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
http://www.ubuntu.com/usn/USN-3077-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/errata/RHSA-2016:1476
https://access.redhat.com/errata/RHSA-2016:1477
https://access.redhat.com/security/cve/CVE-2016-3500
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-3500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
https://kc.mcafee.com/corporate/index?page=content&id=SB10166
https://linux.oracle.com/cve/CVE-2016-3500.html
https://linux.oracle.com/errata/ELSA-2016-1776.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3500
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://ubuntu.com/security/notices/USN-3077-1
https://www.cve.org/CVERecord?id=CVE-2016-3500
|
| java-1.8.0-openjdk |
CVE-2016-3508 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://rhn.redhat.com/errata/RHSA-2016-1776.html
http://www.debian.org/security/2016/dsa-3641
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91972
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
http://www.ubuntu.com/usn/USN-3077-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/errata/RHSA-2016:1476
https://access.redhat.com/errata/RHSA-2016:1477
https://access.redhat.com/security/cve/CVE-2016-3508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
https://kc.mcafee.com/corporate/index?page=content&id=SB10166
https://linux.oracle.com/cve/CVE-2016-3508.html
https://linux.oracle.com/errata/ELSA-2016-1776.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3508
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://ubuntu.com/security/notices/USN-3077-1
https://www.cve.org/CVERecord?id=CVE-2016-3508
|
| java-1.8.0-openjdk |
CVE-2016-3550 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://rhn.redhat.com/errata/RHSA-2016-1776.html
http://www.debian.org/security/2016/dsa-3641
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91951
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
http://www.ubuntu.com/usn/USN-3077-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/errata/RHSA-2016:1476
https://access.redhat.com/errata/RHSA-2016:1477
https://access.redhat.com/security/cve/CVE-2016-3550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
https://linux.oracle.com/cve/CVE-2016-3550.html
https://linux.oracle.com/errata/ELSA-2016-1776.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3550
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://ubuntu.com/security/notices/USN-3077-1
https://www.cve.org/CVERecord?id=CVE-2016-3550
|
| java-1.8.0-openjdk |
CVE-2016-5542 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.111-1.b15.el7_2 |
http://rhn.redhat.com/errata/RHSA-2016-2079.html
http://rhn.redhat.com/errata/RHSA-2016-2088.html
http://rhn.redhat.com/errata/RHSA-2016-2089.html
http://rhn.redhat.com/errata/RHSA-2016-2090.html
http://rhn.redhat.com/errata/RHSA-2016-2136.html
http://rhn.redhat.com/errata/RHSA-2016-2137.html
http://rhn.redhat.com/errata/RHSA-2016-2138.html
http://rhn.redhat.com/errata/RHSA-2016-2658.html
http://rhn.redhat.com/errata/RHSA-2016-2659.html
http://rhn.redhat.com/errata/RHSA-2017-0061.html
http://www.debian.org/security/2016/dsa-3707
http://www.oracle.com/technetwork/java/javase/8u111-relnotes-3124969.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
http://www.securityfocus.com/bid/93643
http://www.securitytracker.com/id/1037040
http://www.ubuntu.com/usn/USN-3130-1
http://www.ubuntu.com/usn/USN-3154-1
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542
https://linux.oracle.com/cve/CVE-2016-5542.html
https://linux.oracle.com/errata/ELSA-2017-0061.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5542
https://security.gentoo.org/glsa/201611-04
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20161019-0001/
https://ubuntu.com/security/notices/USN-3121-1
https://ubuntu.com/security/notices/USN-3130-1
https://ubuntu.com/security/notices/USN-3154-1
https://www.cve.org/CVERecord?id=CVE-2016-5542
|
| java-1.8.0-openjdk |
CVE-2016-5546 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/31dae74ad077
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95506
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
https://linux.oracle.com/cve/CVE-2016-5546.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5546
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2016-5546
|
| java-1.8.0-openjdk |
CVE-2016-5547 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/683c9263a5b1
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95521
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
https://linux.oracle.com/cve/CVE-2016-5547.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5547
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://www.cve.org/CVERecord?id=CVE-2016-5547
|
| java-1.8.0-openjdk |
CVE-2016-5552 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95512
http://www.securitytracker.com/id/1037637
http://www.securitytracker.com/id/1037798
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
https://linux.oracle.com/cve/CVE-2016-5552.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5552
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://source.android.com/security/bulletin/2017-02-01.html
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2016-5552
|
| java-1.8.0-openjdk |
CVE-2016-5554 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.111-1.b15.el7_2 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/588df0398c57
http://rhn.redhat.com/errata/RHSA-2016-2079.html
http://rhn.redhat.com/errata/RHSA-2016-2088.html
http://rhn.redhat.com/errata/RHSA-2016-2089.html
http://rhn.redhat.com/errata/RHSA-2016-2090.html
http://rhn.redhat.com/errata/RHSA-2016-2136.html
http://rhn.redhat.com/errata/RHSA-2016-2137.html
http://rhn.redhat.com/errata/RHSA-2016-2138.html
http://rhn.redhat.com/errata/RHSA-2016-2658.html
http://rhn.redhat.com/errata/RHSA-2016-2659.html
http://rhn.redhat.com/errata/RHSA-2017-0061.html
http://www.debian.org/security/2016/dsa-3707
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
http://www.securityfocus.com/bid/93637
http://www.securitytracker.com/id/1037040
http://www.ubuntu.com/usn/USN-3130-1
http://www.ubuntu.com/usn/USN-3154-1
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554
https://linux.oracle.com/cve/CVE-2016-5554.html
https://linux.oracle.com/errata/ELSA-2017-0061.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5554
https://security.gentoo.org/glsa/201611-04
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20161019-0001/
https://ubuntu.com/security/notices/USN-3121-1
https://ubuntu.com/security/notices/USN-3130-1
https://ubuntu.com/security/notices/USN-3154-1
https://www.cve.org/CVERecord?id=CVE-2016-5554
|
| java-1.8.0-openjdk |
CVE-2016-5597 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.111-1.b15.el7_2 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/d689f7b806c8
http://rhn.redhat.com/errata/RHSA-2016-2079.html
http://rhn.redhat.com/errata/RHSA-2016-2088.html
http://rhn.redhat.com/errata/RHSA-2016-2089.html
http://rhn.redhat.com/errata/RHSA-2016-2090.html
http://rhn.redhat.com/errata/RHSA-2016-2136.html
http://rhn.redhat.com/errata/RHSA-2016-2137.html
http://rhn.redhat.com/errata/RHSA-2016-2138.html
http://rhn.redhat.com/errata/RHSA-2016-2658.html
http://rhn.redhat.com/errata/RHSA-2016-2659.html
http://rhn.redhat.com/errata/RHSA-2017-0061.html
http://www.debian.org/security/2016/dsa-3707
http://www.oracle.com/technetwork/java/javase/8u111-relnotes-3124969.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
http://www.securityfocus.com/bid/93636
http://www.securitytracker.com/id/1037040
http://www.ubuntu.com/usn/USN-3130-1
http://www.ubuntu.com/usn/USN-3154-1
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597
https://linux.oracle.com/cve/CVE-2016-5597.html
https://linux.oracle.com/errata/ELSA-2017-0061.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5597
https://security.gentoo.org/glsa/201611-04
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20161019-0001/
https://ubuntu.com/security/notices/USN-3121-1
https://ubuntu.com/security/notices/USN-3130-1
https://ubuntu.com/security/notices/USN-3154-1
https://www.cve.org/CVERecord?id=CVE-2016-5597
|
| java-1.8.0-openjdk |
CVE-2017-10081 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99853
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/security/cve/CVE-2017-10081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
https://linux.oracle.com/cve/CVE-2017-10081.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10081
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10081
|
| java-1.8.0-openjdk |
CVE-2017-10108 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99846
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10108
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
https://linux.oracle.com/cve/CVE-2017-10108.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10108
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10108
|
| java-1.8.0-openjdk |
CVE-2017-10109 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99847
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
https://linux.oracle.com/cve/CVE-2017-10109.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10109
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10109
|
| java-1.8.0-openjdk |
CVE-2017-10115 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99774
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10115
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
https://linux.oracle.com/cve/CVE-2017-10115.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10115
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10115
|
| java-1.8.0-openjdk |
CVE-2017-10118 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
|
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99782
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/security/cve/CVE-2017-10118
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
https://nvd.nist.gov/vuln/detail/CVE-2017-10118
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10118
|
| java-1.8.0-openjdk |
CVE-2017-10176 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
|
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99788
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/security/cve/CVE-2017-10176
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
https://nvd.nist.gov/vuln/detail/CVE-2017-10176
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10176
|
| java-1.8.0-openjdk |
CVE-2017-10198 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99818
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/security/cve/CVE-2017-10198
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
https://linux.oracle.com/cve/CVE-2017-10198.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10198
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://www.cve.org/CVERecord?id=CVE-2017-10198
|
| java-1.8.0-openjdk |
CVE-2017-10243 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99827
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
https://linux.oracle.com/cve/CVE-2017-10243.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10243
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10243
|
| java-1.8.0-openjdk |
CVE-2017-10281 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101378
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
https://linux.oracle.com/cve/CVE-2017-10281.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10281
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10281
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk |
CVE-2017-10295 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101384
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
https://linux.oracle.com/cve/CVE-2017-10295.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10295
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10295
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk |
CVE-2017-10347 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101382
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
https://linux.oracle.com/cve/CVE-2017-10347.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10347
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10347
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk |
CVE-2017-10348 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101354
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
https://linux.oracle.com/cve/CVE-2017-10348.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10348
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10348
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk |
CVE-2017-10349 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101348
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
https://linux.oracle.com/cve/CVE-2017-10349.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10349
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10349
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk |
CVE-2017-10350 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101341
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
https://linux.oracle.com/cve/CVE-2017-10350.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10350
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10350
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk |
CVE-2017-10355 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/java/javase/8u151-relnotes-3850493.html
http://www.oracle.com/technetwork/java/javase/documentation/overview-156328.html#R160_171
http://www.oracle.com/technetwork/java/javaseproducts/documentation/javase7supportreleasenotes-1601161.html#R170_161
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101369
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10355
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
https://linux.oracle.com/cve/CVE-2017-10355.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10355
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10355
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk |
CVE-2017-10356 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101413
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
https://linux.oracle.com/cve/CVE-2017-10356.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10356
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10356
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk |
CVE-2017-10357 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101355
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
https://linux.oracle.com/cve/CVE-2017-10357.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10357
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10357
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk |
CVE-2017-3231 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/dfa1648415a4
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95563
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
https://linux.oracle.com/cve/CVE-2017-3231.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3231
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2017-3231
|
| java-1.8.0-openjdk |
CVE-2017-3252 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/6cb0106507eb
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95509
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
https://linux.oracle.com/cve/CVE-2017-3252.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3252
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2017-3252
|
| java-1.8.0-openjdk |
CVE-2017-3253 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/b59238f0e161
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95498
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
https://linux.oracle.com/cve/CVE-2017-3253.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3253
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2017-3253
|
| java-1.8.0-openjdk |
CVE-2017-3261 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/876a505a9f20
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95566
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
https://linux.oracle.com/cve/CVE-2017-3261.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3261
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2017-3261
|
| java-1.8.0-openjdk |
CVE-2017-3509 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.131-2.b11.el7_3 |
http://www.debian.org/security/2017/dsa-3858
http://www.oracle.com/technetwork/java/javase/8u131-relnotes-3565278.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixJAVA
http://www.securityfocus.com/bid/97737
http://www.securitytracker.com/id/1038286
https://access.redhat.com/errata/RHSA-2017:1108
https://access.redhat.com/errata/RHSA-2017:1109
https://access.redhat.com/errata/RHSA-2017:1117
https://access.redhat.com/errata/RHSA-2017:1118
https://access.redhat.com/errata/RHSA-2017:1119
https://access.redhat.com/errata/RHSA-2017:1204
https://access.redhat.com/errata/RHSA-2017:1220
https://access.redhat.com/errata/RHSA-2017:1221
https://access.redhat.com/errata/RHSA-2017:1222
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-3509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
https://linux.oracle.com/cve/CVE-2017-3509.html
https://linux.oracle.com/errata/ELSA-2017-1204.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3509
https://security-tracker.debian.org/tracker/CVE-2017-3509
https://security.gentoo.org/glsa/201705-03
https://security.gentoo.org/glsa/201707-01
https://ubuntu.com/security/notices/USN-3275-1
https://ubuntu.com/security/notices/USN-3275-2
https://www.cve.org/CVERecord?id=CVE-2017-3509
|
| java-1.8.0-openjdk |
CVE-2017-3511 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.131-2.b11.el7_3 |
http://www.debian.org/security/2017/dsa-3858
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixJAVA
http://www.securityfocus.com/bid/97731
http://www.securitytracker.com/id/1038286
https://access.redhat.com/errata/RHSA-2017:1108
https://access.redhat.com/errata/RHSA-2017:1109
https://access.redhat.com/errata/RHSA-2017:1117
https://access.redhat.com/errata/RHSA-2017:1118
https://access.redhat.com/errata/RHSA-2017:1204
https://access.redhat.com/errata/RHSA-2017:1220
https://access.redhat.com/errata/RHSA-2017:1221
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-3511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
https://linux.oracle.com/cve/CVE-2017-3511.html
https://linux.oracle.com/errata/ELSA-2017-1204.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3511
https://security.gentoo.org/glsa/201705-03
https://security.gentoo.org/glsa/201707-01
https://ubuntu.com/security/notices/USN-3275-1
https://ubuntu.com/security/notices/USN-3275-2
https://www.cve.org/CVERecord?id=CVE-2017-3511
|
| java-1.8.0-openjdk |
CVE-2017-3526 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.131-2.b11.el7_3 |
http://www.debian.org/security/2017/dsa-3858
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixJAVA
http://www.securityfocus.com/bid/97733
http://www.securitytracker.com/id/1038286
https://access.redhat.com/errata/RHSA-2017:1108
https://access.redhat.com/errata/RHSA-2017:1109
https://access.redhat.com/errata/RHSA-2017:1117
https://access.redhat.com/errata/RHSA-2017:1118
https://access.redhat.com/errata/RHSA-2017:1119
https://access.redhat.com/errata/RHSA-2017:1204
https://access.redhat.com/security/cve/CVE-2017-3526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
https://linux.oracle.com/cve/CVE-2017-3526.html
https://linux.oracle.com/errata/ELSA-2017-1204.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3526
https://security.gentoo.org/glsa/201705-03
https://security.gentoo.org/glsa/201707-01
https://ubuntu.com/security/notices/USN-3275-1
https://ubuntu.com/security/notices/USN-3275-2
https://www.cve.org/CVERecord?id=CVE-2017-3526
|
| java-1.8.0-openjdk |
CVE-2017-3539 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.131-2.b11.el7_3 |
http://www.debian.org/security/2017/dsa-3858
http://www.oracle.com/technetwork/java/javase/8u131-relnotes-3565278.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixJAVA
http://www.securityfocus.com/bid/97752
http://www.securitytracker.com/id/1038286
https://access.redhat.com/errata/RHSA-2017:1108
https://access.redhat.com/errata/RHSA-2017:1109
https://access.redhat.com/errata/RHSA-2017:1117
https://access.redhat.com/errata/RHSA-2017:1118
https://access.redhat.com/errata/RHSA-2017:1119
https://access.redhat.com/errata/RHSA-2017:1204
https://access.redhat.com/errata/RHSA-2017:1220
https://access.redhat.com/errata/RHSA-2017:1221
https://access.redhat.com/errata/RHSA-2017:1222
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-3539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
https://linux.oracle.com/cve/CVE-2017-3539.html
https://linux.oracle.com/errata/ELSA-2017-1204.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3539
https://security.gentoo.org/glsa/201705-03
https://security.gentoo.org/glsa/201707-01
https://ubuntu.com/security/notices/USN-3275-1
https://ubuntu.com/security/notices/USN-3275-2
https://www.cve.org/CVERecord?id=CVE-2017-3539
https://www.java.com/en/jre-jdk-cryptoroadmap.html
|
| java-1.8.0-openjdk |
CVE-2018-2588 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102661
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2588.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2588
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2588
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2599 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102633
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2599.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2599
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2599
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2602 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102642
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2602.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2602
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2602
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2603 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102625
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2603.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2603
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2603
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2618 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/java/javase/8u161-relnotes-4021379.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102612
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2618.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2618
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2618
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2629 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102615
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2629.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2629
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2629
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2663 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102662
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2663.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2663
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2663
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2677 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102656
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2677.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2677
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2677
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2678 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102659
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2678.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2678
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2678
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2795 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103847
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2795.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2795
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2795
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk |
CVE-2018-2796 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103868
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2796.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2796
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2796
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk |
CVE-2018-2797 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103846
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2797.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2797
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2797
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk |
CVE-2018-2798 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103841
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2798.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2798
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2798
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk |
CVE-2018-2799 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103872
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2799.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E
https://lists.apache.org/thread.html/b53d4601ecd9ec63c799dbe1bc5b78e0d52f4cef429da2dfe63cf06d%40%3Cfop-dev.xmlgraphics.apache.org%3E
https://lists.apache.org/thread.html/r449b5d89c7b2ba3762584cf6c38e01867d4b24706e023cf2a9911307%40%3Cuser.spark.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-2799
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2799
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk |
CVE-2018-2800 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103849
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2800.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2800
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2800
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk |
CVE-2018-2815 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103848
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/security/cve/CVE-2018-2815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2815.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2815
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2815
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk |
CVE-2018-2952 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.181-3.b13.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104765
http://www.securitytracker.com/id/1041302
https://access.redhat.com/errata/RHSA-2018:2241
https://access.redhat.com/errata/RHSA-2018:2242
https://access.redhat.com/errata/RHSA-2018:2253
https://access.redhat.com/errata/RHSA-2018:2254
https://access.redhat.com/errata/RHSA-2018:2255
https://access.redhat.com/errata/RHSA-2018:2256
https://access.redhat.com/errata/RHSA-2018:2283
https://access.redhat.com/errata/RHSA-2018:2286
https://access.redhat.com/errata/RHSA-2018:2568
https://access.redhat.com/errata/RHSA-2018:2569
https://access.redhat.com/errata/RHSA-2018:2575
https://access.redhat.com/errata/RHSA-2018:2576
https://access.redhat.com/errata/RHSA-2018:2712
https://access.redhat.com/errata/RHSA-2018:2713
https://access.redhat.com/errata/RHSA-2018:3007
https://access.redhat.com/errata/RHSA-2018:3008
https://access.redhat.com/security/cve/CVE-2018-2952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2952
https://linux.oracle.com/cve/CVE-2018-2952.html
https://linux.oracle.com/errata/ELSA-2018-2286.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2952
https://security.netapp.com/advisory/ntap-20180726-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us
https://ubuntu.com/security/notices/USN-3734-1
https://ubuntu.com/security/notices/USN-3735-1
https://ubuntu.com/security/notices/USN-3747-1
https://usn.ubuntu.com/3734-1/
https://usn.ubuntu.com/3735-1/
https://usn.ubuntu.com/3747-1/
https://www.cve.org/CVERecord?id=CVE-2018-2952
https://www.debian.org/security/2018/dsa-4268
|
| java-1.8.0-openjdk |
CVE-2018-3136 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105601
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3000
https://access.redhat.com/errata/RHSA-2018:3001
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3007
https://access.redhat.com/errata/RHSA-2018:3008
https://access.redhat.com/errata/RHSA-2018:3350
https://access.redhat.com/errata/RHSA-2018:3409
https://access.redhat.com/errata/RHSA-2018:3521
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3671
https://access.redhat.com/errata/RHSA-2018:3672
https://access.redhat.com/errata/RHSA-2018:3779
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136
https://linux.oracle.com/cve/CVE-2018-3136.html
https://linux.oracle.com/errata/ELSA-2018-3521.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3136
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://ubuntu.com/security/notices/USN-3824-1
https://usn.ubuntu.com/3804-1/
https://usn.ubuntu.com/3824-1/
https://www.cve.org/CVERecord?id=CVE-2018-3136
https://www.debian.org/security/2018/dsa-4326
|
| java-1.8.0-openjdk |
CVE-2018-3139 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105602
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3000
https://access.redhat.com/errata/RHSA-2018:3001
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3007
https://access.redhat.com/errata/RHSA-2018:3008
https://access.redhat.com/errata/RHSA-2018:3350
https://access.redhat.com/errata/RHSA-2018:3409
https://access.redhat.com/errata/RHSA-2018:3521
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3671
https://access.redhat.com/errata/RHSA-2018:3672
https://access.redhat.com/errata/RHSA-2018:3779
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139
https://linux.oracle.com/cve/CVE-2018-3139.html
https://linux.oracle.com/errata/ELSA-2018-3521.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3139
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://ubuntu.com/security/notices/USN-3824-1
https://usn.ubuntu.com/3804-1/
https://usn.ubuntu.com/3824-1/
https://www.cve.org/CVERecord?id=CVE-2018-3139
https://www.debian.org/security/2018/dsa-4326
https://www.oracle.com/technetwork/java/javase/11-0-1-relnotes-5032023.html
|
| java-1.8.0-openjdk |
CVE-2018-3180 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105617
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3000
https://access.redhat.com/errata/RHSA-2018:3001
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3007
https://access.redhat.com/errata/RHSA-2018:3008
https://access.redhat.com/errata/RHSA-2018:3350
https://access.redhat.com/errata/RHSA-2018:3409
https://access.redhat.com/errata/RHSA-2018:3521
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3671
https://access.redhat.com/errata/RHSA-2018:3672
https://access.redhat.com/errata/RHSA-2018:3779
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180
https://linux.oracle.com/cve/CVE-2018-3180.html
https://linux.oracle.com/errata/ELSA-2018-3521.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3180
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://ubuntu.com/security/notices/USN-3824-1
https://usn.ubuntu.com/3804-1/
https://usn.ubuntu.com/3824-1/
https://www.cve.org/CVERecord?id=CVE-2018-3180
https://www.debian.org/security/2018/dsa-4326
|
| java-1.8.0-openjdk |
CVE-2018-3214 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105615
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3000
https://access.redhat.com/errata/RHSA-2018:3001
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3007
https://access.redhat.com/errata/RHSA-2018:3008
https://access.redhat.com/errata/RHSA-2018:3350
https://access.redhat.com/errata/RHSA-2018:3409
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3671
https://access.redhat.com/errata/RHSA-2018:3672
https://access.redhat.com/errata/RHSA-2018:3779
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214
https://linux.oracle.com/cve/CVE-2018-3214.html
https://linux.oracle.com/errata/ELSA-2018-3409.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3214
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://usn.ubuntu.com/3804-1/
https://www.cve.org/CVERecord?id=CVE-2018-3214
https://www.debian.org/security/2018/dsa-4326
|
| java-1.8.0-openjdk |
CVE-2019-2422 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.201.b09-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
http://www.securityfocus.com/bid/106596
https://access.redhat.com/errata/RHSA-2019:0416
https://access.redhat.com/errata/RHSA-2019:0435
https://access.redhat.com/errata/RHSA-2019:0436
https://access.redhat.com/errata/RHSA-2019:0462
https://access.redhat.com/errata/RHSA-2019:0464
https://access.redhat.com/errata/RHSA-2019:0469
https://access.redhat.com/errata/RHSA-2019:0472
https://access.redhat.com/errata/RHSA-2019:0473
https://access.redhat.com/errata/RHSA-2019:0474
https://access.redhat.com/errata/RHSA-2019:0640
https://access.redhat.com/errata/RHSA-2019:1238
https://access.redhat.com/security/cve/CVE-2019-2422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2422
https://linux.oracle.com/cve/CVE-2019-2422.html
https://linux.oracle.com/errata/ELSA-2019-0464.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2422
https://seclists.org/bugtraq/2019/Mar/27
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20190118-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us
https://ubuntu.com/security/notices/USN-3875-1
https://ubuntu.com/security/notices/USN-3942-1
https://ubuntu.com/security/notices/USN-3949-1
https://usn.ubuntu.com/3875-1/
https://usn.ubuntu.com/3942-1/
https://usn.ubuntu.com/3949-1/
https://www.cve.org/CVERecord?id=CVE-2019-2422
https://www.debian.org/security/2019/dsa-4410
|
| java-1.8.0-openjdk |
CVE-2019-2602 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.212.b04-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://access.redhat.com/errata/RHBA-2019:0959
https://access.redhat.com/errata/RHSA-2019:1146
https://access.redhat.com/errata/RHSA-2019:1163
https://access.redhat.com/errata/RHSA-2019:1164
https://access.redhat.com/errata/RHSA-2019:1165
https://access.redhat.com/errata/RHSA-2019:1166
https://access.redhat.com/errata/RHSA-2019:1238
https://access.redhat.com/errata/RHSA-2019:1325
https://access.redhat.com/errata/RHSA-2019:1518
https://access.redhat.com/security/cve/CVE-2019-2602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2602
https://kc.mcafee.com/corporate/index?page=content&id=SB10285
https://linux.oracle.com/cve/CVE-2019-2602.html
https://linux.oracle.com/errata/ELSA-2019-1518.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2602
https://seclists.org/bugtraq/2019/May/75
https://security.gentoo.org/glsa/201908-10
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us
https://ubuntu.com/security/notices/USN-3975-1
https://usn.ubuntu.com/3975-1/
https://www.cve.org/CVERecord?id=CVE-2019-2602
https://www.debian.org/security/2019/dsa-4453
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixJAVA
|
| java-1.8.0-openjdk |
CVE-2019-2684 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.212.b04-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
http://www.openwall.com/lists/oss-security/2020/09/01/4
http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://access.redhat.com/errata/RHBA-2019:0959
https://access.redhat.com/errata/RHSA-2019:1146
https://access.redhat.com/errata/RHSA-2019:1163
https://access.redhat.com/errata/RHSA-2019:1164
https://access.redhat.com/errata/RHSA-2019:1165
https://access.redhat.com/errata/RHSA-2019:1166
https://access.redhat.com/errata/RHSA-2019:1238
https://access.redhat.com/errata/RHSA-2019:1325
https://access.redhat.com/errata/RHSA-2019:1518
https://access.redhat.com/security/cve/CVE-2019-2684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2684
https://linux.oracle.com/cve/CVE-2019-2684.html
https://linux.oracle.com/errata/ELSA-2019-1518.html
https://lists.apache.org/thread.html/38a01302c92ae513910d8c851a2d111736565bd698be4e3af3e4c063%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/71bd3e4e222479c266eaafc8d0c171ef5782a69b52f68df11b650ed7%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c58d6c3b49c615916b163809f963a55421cac2264885739508e68108%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/f7f54b4888060d99f59993f006e25005a2b58db0c07ff866bdcd6f17%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1fd117082b992e7d43c1286e966c285f98aa362e685695d999ff42f7%40%3Cuser.cassandra.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r718e01f61b35409a4f7a3ccbc1cb5136a1558a9f9c2cb8d4ca9be1ce%40%3Cuser.cassandra.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rab8d90d28f944d84e4d7852f355a25c89451ae02c2decc4d355a9cfc%40%3Cuser.cassandra.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rcd7544b24d8fc32b7950ec4c117052410b661babaa857fb1fc641152%40%3Cdev.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rcd7544b24d8fc32b7950ec4c117052410b661babaa857fb1fc641152%40%3Cuser.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/05/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2684
https://seclists.org/bugtraq/2019/May/75
https://security.gentoo.org/glsa/201908-10
https://support.f5.com/csp/article/K11175903?utm_source=f5support&%3Butm_medium=RSS
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us
https://ubuntu.com/security/notices/USN-3975-1
https://usn.ubuntu.com/3975-1/
https://www.cve.org/CVERecord?id=CVE-2019-2684
https://www.debian.org/security/2019/dsa-4453
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixJAVA
|
| java-1.8.0-openjdk |
CVE-2019-2745 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.222.b10-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://access.redhat.com/security/cve/CVE-2019-2745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745
https://kc.mcafee.com/corporate/index?page=content&id=SB10300
https://linux.oracle.com/cve/CVE-2019-2745.html
https://linux.oracle.com/errata/ELSA-2019-1840.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2745
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
https://ubuntu.com/security/notices/USN-4080-1
https://usn.ubuntu.com/4080-1/
https://www.cve.org/CVERecord?id=CVE-2019-2745
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| java-1.8.0-openjdk |
CVE-2019-2762 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.222.b10-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://access.redhat.com/errata/RHSA-2019:2494
https://access.redhat.com/errata/RHSA-2019:2495
https://access.redhat.com/errata/RHSA-2019:2585
https://access.redhat.com/errata/RHSA-2019:2590
https://access.redhat.com/errata/RHSA-2019:2592
https://access.redhat.com/errata/RHSA-2019:2737
https://access.redhat.com/security/cve/CVE-2019-2762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762
https://kc.mcafee.com/corporate/index?page=content&id=SB10300
https://linux.oracle.com/cve/CVE-2019-2762.html
https://linux.oracle.com/errata/ELSA-2019-1840.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2762
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
https://ubuntu.com/security/notices/USN-4080-1
https://ubuntu.com/security/notices/USN-4083-1
https://usn.ubuntu.com/4080-1/
https://usn.ubuntu.com/4083-1/
https://www.cve.org/CVERecord?id=CVE-2019-2762
https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/5572395.xml
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| java-1.8.0-openjdk |
CVE-2019-2769 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.222.b10-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://access.redhat.com/errata/RHSA-2019:2494
https://access.redhat.com/errata/RHSA-2019:2495
https://access.redhat.com/errata/RHSA-2019:2585
https://access.redhat.com/errata/RHSA-2019:2590
https://access.redhat.com/errata/RHSA-2019:2592
https://access.redhat.com/errata/RHSA-2019:2737
https://access.redhat.com/security/cve/CVE-2019-2769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769
https://kc.mcafee.com/corporate/index?page=content&id=SB10300
https://linux.oracle.com/cve/CVE-2019-2769.html
https://linux.oracle.com/errata/ELSA-2019-1840.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2769
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
https://ubuntu.com/security/notices/USN-4080-1
https://ubuntu.com/security/notices/USN-4083-1
https://usn.ubuntu.com/4080-1/
https://usn.ubuntu.com/4083-1/
https://www.cve.org/CVERecord?id=CVE-2019-2769
|
| java-1.8.0-openjdk |
CVE-2019-2816 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.222.b10-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://access.redhat.com/errata/RHSA-2019:2494
https://access.redhat.com/errata/RHSA-2019:2495
https://access.redhat.com/errata/RHSA-2019:2585
https://access.redhat.com/errata/RHSA-2019:2590
https://access.redhat.com/errata/RHSA-2019:2592
https://access.redhat.com/errata/RHSA-2019:2737
https://access.redhat.com/security/cve/CVE-2019-2816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816
https://kc.mcafee.com/corporate/index?page=content&id=SB10300
https://linux.oracle.com/cve/CVE-2019-2816.html
https://linux.oracle.com/errata/ELSA-2019-1840.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2816
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
https://ubuntu.com/security/notices/USN-4080-1
https://ubuntu.com/security/notices/USN-4083-1
https://usn.ubuntu.com/4080-1/
https://usn.ubuntu.com/4083-1/
https://www.cve.org/CVERecord?id=CVE-2019-2816
https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/5572395.xml
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| java-1.8.0-openjdk |
CVE-2019-2842 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.222.b10-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://access.redhat.com/security/cve/CVE-2019-2842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842
https://kc.mcafee.com/corporate/index?page=content&id=SB10300
https://linux.oracle.com/cve/CVE-2019-2842.html
https://linux.oracle.com/errata/ELSA-2019-1840.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2842
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
https://ubuntu.com/security/notices/USN-4080-1
https://usn.ubuntu.com/4080-1/
https://www.cve.org/CVERecord?id=CVE-2019-2842
https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/5572395.xml
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| java-1.8.0-openjdk |
CVE-2019-2975 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2019-2975.html
https://linux.oracle.com/errata/ELSA-2019-3136.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2975
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2975
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk |
CVE-2019-2978 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
https://linux.oracle.com/cve/CVE-2019-2978.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2978
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2978
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk |
CVE-2019-2989 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2019-2989.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2989
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2989
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk |
CVE-2020-14556 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
https://linux.oracle.com/cve/CVE-2020-14556.html
https://linux.oracle.com/errata/ELSA-2020-2985.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
https://nvd.nist.gov/vuln/detail/CVE-2020-14556
https://security.gentoo.org/glsa/202008-24
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4433-1
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4433-1/
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14556
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk |
CVE-2020-14578 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-14578.html
https://linux.oracle.com/errata/ELSA-2020-2985.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://nvd.nist.gov/vuln/detail/CVE-2020-14578
https://security.gentoo.org/glsa/202008-24
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14578
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk |
CVE-2020-14579 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-14579.html
https://linux.oracle.com/errata/ELSA-2020-2985.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://nvd.nist.gov/vuln/detail/CVE-2020-14579
https://security.gentoo.org/glsa/202008-24
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14579
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk |
CVE-2020-14621 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-14621.html
https://linux.oracle.com/errata/ELSA-2020-2985.html
https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103%40%3Cj-users.xerces.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
https://nvd.nist.gov/vuln/detail/CVE-2020-14621
https://security.gentoo.org/glsa/202008-24
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4433-1
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4433-1/
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14621
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk |
CVE-2020-14781 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
https://linux.oracle.com/cve/CVE-2020-14781.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14781
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14781
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk |
CVE-2020-14782 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
https://linux.oracle.com/cve/CVE-2020-14782.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14782
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14782
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk |
CVE-2020-14792 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
https://linux.oracle.com/cve/CVE-2020-14792.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14792
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14792
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk |
CVE-2020-14797 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
https://linux.oracle.com/cve/CVE-2020-14797.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14797
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14797
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk |
CVE-2020-14803 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
https://linux.oracle.com/cve/CVE-2020-14803.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14803
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14803
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2590 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0157
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0232
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2020-2590.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2590
https://seclists.org/bugtraq/2020/Feb/22
https://seclists.org/bugtraq/2020/Jan/24
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2590
https://www.debian.org/security/2020/dsa-4605
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2593 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0157
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0232
https://access.redhat.com/errata/RHSA-2020:0465
https://access.redhat.com/errata/RHSA-2020:0467
https://access.redhat.com/errata/RHSA-2020:0468
https://access.redhat.com/errata/RHSA-2020:0469
https://access.redhat.com/errata/RHSA-2020:0470
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2020-2593.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2593
https://seclists.org/bugtraq/2020/Feb/22
https://seclists.org/bugtraq/2020/Jan/24
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2593
https://www.debian.org/security/2020/dsa-4605
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2654 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0157
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0232
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2020-2654.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2654
https://seclists.org/bugtraq/2020/Feb/22
https://seclists.org/bugtraq/2020/Jan/24
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2654
https://www.debian.org/security/2020/dsa-4605
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2773 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-2773.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2773
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2773
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2781 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
https://kc.mcafee.com/corporate/index?page=content&id=SB10318
https://linux.oracle.com/cve/CVE-2020-2781.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2781
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2781
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2800 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
https://linux.oracle.com/cve/CVE-2020-2800.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2800
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2800
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2830 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
https://kc.mcafee.com/corporate/index?page=content&id=SB10318
https://linux.oracle.com/cve/CVE-2020-2830.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2830
https://security.gentoo.org/glsa/202006-22
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2830
https://www.debian.org/security/2020/dsa-4662
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk |
CVE-2021-2163 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.292.b10-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-2163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163
https://linux.oracle.com/cve/CVE-2021-2163.html
https://linux.oracle.com/errata/ELSA-2021-1307.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
https://nvd.nist.gov/vuln/detail/CVE-2021-2163
https://rhn.redhat.com/errata/RHSA-2021-1301.html
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20210513-0001/
https://ubuntu.com/security/notices/USN-4892-1
https://www.cve.org/CVERecord?id=CVE-2021-2163
https://www.debian.org/security/2021/dsa-4899
https://www.oracle.com/security-alerts/cpuapr2021.html
|
| java-1.8.0-openjdk |
CVE-2021-2341 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.302.b08-0.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json
https://access.redhat.com/security/cve/CVE-2021-2341
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
https://linux.oracle.com/cve/CVE-2021-2341.html
https://linux.oracle.com/errata/ELSA-2021-2845.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
https://nvd.nist.gov/vuln/detail/CVE-2021-2341
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20210723-0002/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-2341
https://www.debian.org/security/2021/dsa-4946
https://www.oracle.com/java/technologies/javase/11-0-12-relnotes.html
https://www.oracle.com/java/technologies/javase/8u301-relnotes.html
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2021-2369 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.302.b08-0.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json
https://access.redhat.com/security/cve/CVE-2021-2369
https://bugzilla.redhat.com/show_bug.cgi?id=1982879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
https://linux.oracle.com/cve/CVE-2021-2369.html
https://linux.oracle.com/errata/ELSA-2021-2845.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2021-2369
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20210723-0002/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-2369
https://www.debian.org/security/2021/dsa-4946
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2021-35550 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
https://linux.oracle.com/cve/CVE-2021-35550.html
https://linux.oracle.com/errata/ELSA-2021-3893.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
https://nvd.nist.gov/vuln/detail/CVE-2021-35550
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35550
https://www.debian.org/security/2021/dsa-5000
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2021-35556 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
https://linux.oracle.com/cve/CVE-2021-35556.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
https://nvd.nist.gov/vuln/detail/CVE-2021-35556
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35556
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2021-35559 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
https://linux.oracle.com/cve/CVE-2021-35559.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
https://nvd.nist.gov/vuln/detail/CVE-2021-35559
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35559
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2021-35561 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
https://linux.oracle.com/cve/CVE-2021-35561.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
https://nvd.nist.gov/vuln/detail/CVE-2021-35561
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35561
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2021-35564 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35564
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
https://linux.oracle.com/cve/CVE-2021-35564.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
https://nvd.nist.gov/vuln/detail/CVE-2021-35564
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35564
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2021-35578 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
https://linux.oracle.com/cve/CVE-2021-35578.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://nvd.nist.gov/vuln/detail/CVE-2021-35578
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35578
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2021-35586 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
https://linux.oracle.com/cve/CVE-2021-35586.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://nvd.nist.gov/vuln/detail/CVE-2021-35586
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35586
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2022-21248 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
https://linux.oracle.com/cve/CVE-2022-21248.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
https://nvd.nist.gov/vuln/detail/CVE-2022-21248
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21248
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21282 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
https://linux.oracle.com/cve/CVE-2022-21282.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21282
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21282
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21283 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
https://linux.oracle.com/cve/CVE-2022-21283.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
https://nvd.nist.gov/vuln/detail/CVE-2022-21283
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21283
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21293 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
https://linux.oracle.com/cve/CVE-2022-21293.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
https://nvd.nist.gov/vuln/detail/CVE-2022-21293
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21293
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21294 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21294
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
https://linux.oracle.com/cve/CVE-2022-21294.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21294
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21294
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21296 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
https://linux.oracle.com/cve/CVE-2022-21296.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21296
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21296
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21299 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
https://linux.oracle.com/cve/CVE-2022-21299.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21299
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21299
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21305 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
https://linux.oracle.com/cve/CVE-2022-21305.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21305
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21305
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21340 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
https://linux.oracle.com/cve/CVE-2022-21340.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21340
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21340
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21341 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21341
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
https://linux.oracle.com/cve/CVE-2022-21341.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21341
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21341
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21360 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
https://linux.oracle.com/cve/CVE-2022-21360.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21360
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21360
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21365 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
https://linux.oracle.com/cve/CVE-2022-21365.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21365
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21365
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21426 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.332.b09-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
https://access.redhat.com/security/cve/CVE-2022-21426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
https://errata.almalinux.org/8/ALSA-2022-1491.html
https://linux.oracle.com/cve/CVE-2022-21426.html
https://linux.oracle.com/errata/ELSA-2022-2137.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21426
https://security.netapp.com/advisory/ntap-20220429-0006/
https://ubuntu.com/security/notices/USN-5388-1
https://ubuntu.com/security/notices/USN-5388-2
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21426
https://www.debian.org/security/2022/dsa-5128
https://www.debian.org/security/2022/dsa-5131
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21434 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.332.b09-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
https://access.redhat.com/security/cve/CVE-2022-21434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
https://errata.almalinux.org/8/ALSA-2022-1491.html
https://linux.oracle.com/cve/CVE-2022-21434.html
https://linux.oracle.com/errata/ELSA-2022-2137.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21434
https://security.netapp.com/advisory/ntap-20220429-0006/
https://ubuntu.com/security/notices/USN-5388-1
https://ubuntu.com/security/notices/USN-5388-2
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21434
https://www.debian.org/security/2022/dsa-5128
https://www.debian.org/security/2022/dsa-5131
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21443 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.332.b09-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
https://access.redhat.com/security/cve/CVE-2022-21443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
https://errata.almalinux.org/8/ALSA-2022-1491.html
https://linux.oracle.com/cve/CVE-2022-21443.html
https://linux.oracle.com/errata/ELSA-2022-2137.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21443
https://security.netapp.com/advisory/ntap-20220429-0006/
https://ubuntu.com/security/notices/USN-5388-1
https://ubuntu.com/security/notices/USN-5388-2
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21443
https://www.debian.org/security/2022/dsa-5128
https://www.debian.org/security/2022/dsa-5131
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21496 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.332.b09-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
https://access.redhat.com/security/cve/CVE-2022-21496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
https://errata.almalinux.org/8/ALSA-2022-1491.html
https://linux.oracle.com/cve/CVE-2022-21496.html
https://linux.oracle.com/errata/ELSA-2022-2137.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21496
https://security.netapp.com/advisory/ntap-20220429-0006/
https://ubuntu.com/security/notices/USN-5388-1
https://ubuntu.com/security/notices/USN-5388-2
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21496
https://www.debian.org/security/2022/dsa-5128
https://www.debian.org/security/2022/dsa-5131
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21540 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.342.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2022:5736
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21549.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
https://access.redhat.com/security/cve/CVE-2022-21540
https://bugzilla.redhat.com/2108540
https://bugzilla.redhat.com/2108543
https://bugzilla.redhat.com/2108547
https://bugzilla.redhat.com/2108554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
https://errata.almalinux.org/9/ALSA-2022-5736.html
https://linux.oracle.com/cve/CVE-2022-21540.html
https://linux.oracle.com/errata/ELSA-2022-5736.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
https://nvd.nist.gov/vuln/detail/CVE-2022-21540
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20220729-0009/
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21540
https://www.debian.org/security/2022/dsa-5188
https://www.debian.org/security/2022/dsa-5192
https://www.oracle.com/security-alerts/cpujul2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21541 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.342.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2022:5736
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21549.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
https://access.redhat.com/security/cve/CVE-2022-21541
https://bugzilla.redhat.com/2108540
https://bugzilla.redhat.com/2108543
https://bugzilla.redhat.com/2108547
https://bugzilla.redhat.com/2108554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
https://errata.almalinux.org/9/ALSA-2022-5736.html
https://linux.oracle.com/cve/CVE-2022-21541.html
https://linux.oracle.com/errata/ELSA-2022-5736.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
https://nvd.nist.gov/vuln/detail/CVE-2022-21541
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20220729-0009/
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21541
https://www.debian.org/security/2022/dsa-5188
https://www.debian.org/security/2022/dsa-5192
https://www.oracle.com/security-alerts/cpujul2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21626 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.352.b08-2.el7_9 |
https://access.redhat.com/errata/RHSA-2022:7013
https://access.redhat.com/security/cve/CVE-2022-21626
https://bugzilla.redhat.com/2133745
https://bugzilla.redhat.com/2133753
https://bugzilla.redhat.com/2133765
https://bugzilla.redhat.com/2133769
https://bugzilla.redhat.com/2133776
https://bugzilla.redhat.com/2133817
https://bugzilla.redhat.com/show_bug.cgi?id=2131863
https://bugzilla.redhat.com/show_bug.cgi?id=2133745
https://bugzilla.redhat.com/show_bug.cgi?id=2133753
https://bugzilla.redhat.com/show_bug.cgi?id=2133765
https://bugzilla.redhat.com/show_bug.cgi?id=2133769
https://bugzilla.redhat.com/show_bug.cgi?id=2133776
https://bugzilla.redhat.com/show_bug.cgi?id=2133817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
https://errata.almalinux.org/9/ALSA-2022-7013.html
https://errata.rockylinux.org/RLSA-2022:7012
https://linux.oracle.com/cve/CVE-2022-21626.html
https://linux.oracle.com/errata/ELSA-2022-7013.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
https://nvd.nist.gov/vuln/detail/CVE-2022-21626
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20221028-0012/
https://ubuntu.com/security/notices/USN-5719-1
https://www.cve.org/CVERecord?id=CVE-2022-21626
https://www.oracle.com/security-alerts/cpuoct2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21628 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.352.b08-2.el7_9 |
https://access.redhat.com/errata/RHSA-2022:7013
https://access.redhat.com/security/cve/CVE-2022-21628
https://bugzilla.redhat.com/2133745
https://bugzilla.redhat.com/2133753
https://bugzilla.redhat.com/2133765
https://bugzilla.redhat.com/2133769
https://bugzilla.redhat.com/2133776
https://bugzilla.redhat.com/2133817
https://bugzilla.redhat.com/show_bug.cgi?id=2131863
https://bugzilla.redhat.com/show_bug.cgi?id=2133745
https://bugzilla.redhat.com/show_bug.cgi?id=2133753
https://bugzilla.redhat.com/show_bug.cgi?id=2133765
https://bugzilla.redhat.com/show_bug.cgi?id=2133769
https://bugzilla.redhat.com/show_bug.cgi?id=2133776
https://bugzilla.redhat.com/show_bug.cgi?id=2133817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
https://errata.almalinux.org/9/ALSA-2022-7013.html
https://errata.rockylinux.org/RLSA-2022:7012
https://linux.oracle.com/cve/CVE-2022-21628.html
https://linux.oracle.com/errata/ELSA-2022-7013.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
https://nvd.nist.gov/vuln/detail/CVE-2022-21628
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20221028-0012/
https://ubuntu.com/security/notices/USN-5719-1
https://www.cve.org/CVERecord?id=CVE-2022-21628
https://www.oracle.com/security-alerts/cpuoct2022.html
|
| java-1.8.0-openjdk |
CVE-2023-21830 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.362.b08-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:0210
https://access.redhat.com/security/cve/CVE-2023-21830
https://bugzilla.redhat.com/2160475
https://bugzilla.redhat.com/2160490
https://bugzilla.redhat.com/show_bug.cgi?id=2159912
https://bugzilla.redhat.com/show_bug.cgi?id=2160475
https://bugzilla.redhat.com/show_bug.cgi?id=2160490
https://bugzilla.redhat.com/show_bug.cgi?id=2163594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
https://errata.almalinux.org/9/ALSA-2023-0210.html
https://errata.rockylinux.org/RLSA-2023:0210
https://linux.oracle.com/cve/CVE-2023-21830.html
https://linux.oracle.com/errata/ELSA-2023-0210.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21830
https://security.gentoo.org/glsa/202401-25
https://ubuntu.com/security/notices/USN-5898-1
https://www.cve.org/CVERecord?id=CVE-2023-21830
https://www.oracle.com/java/technologies/javase/8u361-relnotes.html
https://www.oracle.com/security-alerts/cpujan2023.html
https://www.oracle.com/security-alerts/cpujul2023.html
|
| java-1.8.0-openjdk |
CVE-2023-21939 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21939
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21939.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21939
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21939
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk |
CVE-2023-21954 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21954
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21954.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21954
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21954
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk |
CVE-2023-21967 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21967
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21967.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21967
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21967
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk |
CVE-2023-22049 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.382.b05-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:4178
https://access.redhat.com/security/cve/CVE-2023-22049
https://bugzilla.redhat.com/2221645
https://bugzilla.redhat.com/2221647
https://bugzilla.redhat.com/show_bug.cgi?id=2220662
https://bugzilla.redhat.com/show_bug.cgi?id=2221645
https://bugzilla.redhat.com/show_bug.cgi?id=2221647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
https://errata.almalinux.org/9/ALSA-2023-4178.html
https://errata.rockylinux.org/RLSA-2023:4178
https://linux.oracle.com/cve/CVE-2023-22049.html
https://linux.oracle.com/errata/ELSA-2023-4233.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-22049
https://security.netapp.com/advisory/ntap-20230725-0006/
https://ubuntu.com/security/notices/USN-6263-1
https://ubuntu.com/security/notices/USN-6272-1
https://www.cve.org/CVERecord?id=CVE-2023-22049
https://www.debian.org/security/2023/dsa-5458
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpujul2023.html
|
| java-1.8.0-openjdk |
CVE-2023-22067 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.392.b08-2.el7_9 |
https://access.redhat.com/errata/RHSA-2023:5733
https://access.redhat.com/security/cve/CVE-2023-22067
https://bugzilla.redhat.com/2237709
https://bugzilla.redhat.com/2243627
https://bugzilla.redhat.com/2243637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22067
https://errata.almalinux.org/9/ALSA-2023-5733.html
https://linux.oracle.com/cve/CVE-2023-22067.html
https://linux.oracle.com/errata/ELSA-2023-5761.html
https://nvd.nist.gov/vuln/detail/CVE-2023-22067
https://security.netapp.com/advisory/ntap-20231027-0006/
https://ubuntu.com/security/notices/USN-6528-1
https://www.cve.org/CVERecord?id=CVE-2023-22067
https://www.debian.org/security/2023/dsa-5537
https://www.oracle.com/java/technologies/javase/8u391-relnotes.html#JDK-8303384
https://www.oracle.com/security-alerts/cpuoct2023.html
|
| java-1.8.0-openjdk |
CVE-2023-22081 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.392.b08-2.el7_9 |
https://access.redhat.com/errata/RHSA-2023:6738
https://access.redhat.com/security/cve/CVE-2023-22081
https://bugzilla.redhat.com/2243627
https://bugzilla.redhat.com/2243805
https://bugzilla.redhat.com/show_bug.cgi?id=2237170
https://bugzilla.redhat.com/show_bug.cgi?id=2243627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
https://errata.almalinux.org/9/ALSA-2023-6738.html
https://errata.rockylinux.org/RLSA-2023:5742
https://linux.oracle.com/cve/CVE-2023-22081.html
https://linux.oracle.com/errata/ELSA-2023-6887.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00041.html
https://nvd.nist.gov/vuln/detail/CVE-2023-22081
https://security.netapp.com/advisory/ntap-20231027-0006/
https://ubuntu.com/security/notices/USN-6527-1
https://ubuntu.com/security/notices/USN-6528-1
https://www.cve.org/CVERecord?id=CVE-2023-22081
https://www.debian.org/security/2023/dsa-5537
https://www.debian.org/security/2023/dsa-5548
https://www.oracle.com/security-alerts/cpuoct2023.html
|
| java-1.8.0-openjdk |
CVE-2024-20919 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.402.b06-1.el7_9 |
https://access.redhat.com/errata/RHSA-2024:0267
https://access.redhat.com/security/cve/CVE-2024-20919
https://bugzilla.redhat.com/2257720
https://bugzilla.redhat.com/2257728
https://bugzilla.redhat.com/2257837
https://bugzilla.redhat.com/2257853
https://bugzilla.redhat.com/2257859
https://bugzilla.redhat.com/2257874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
https://errata.almalinux.org/9/ALSA-2024-0267.html
https://linux.oracle.com/cve/CVE-2024-20919.html
https://linux.oracle.com/errata/ELSA-2024-0267.html
https://nvd.nist.gov/vuln/detail/CVE-2024-20919
https://ubuntu.com/security/notices/USN-6660-1
https://ubuntu.com/security/notices/USN-6661-1
https://ubuntu.com/security/notices/USN-6662-1
https://www.cve.org/CVERecord?id=CVE-2024-20919
https://www.oracle.com/security-alerts/cpujan2024.html
https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA
|
| java-1.8.0-openjdk |
CVE-2024-20921 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.402.b06-1.el7_9 |
https://access.redhat.com/errata/RHSA-2024:0267
https://access.redhat.com/security/cve/CVE-2024-20921
https://bugzilla.redhat.com/2257720
https://bugzilla.redhat.com/2257728
https://bugzilla.redhat.com/2257837
https://bugzilla.redhat.com/2257853
https://bugzilla.redhat.com/2257859
https://bugzilla.redhat.com/2257874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
https://errata.almalinux.org/9/ALSA-2024-0267.html
https://linux.oracle.com/cve/CVE-2024-20921.html
https://linux.oracle.com/errata/ELSA-2024-0267.html
https://nvd.nist.gov/vuln/detail/CVE-2024-20921
https://ubuntu.com/security/notices/USN-6660-1
https://ubuntu.com/security/notices/USN-6661-1
https://ubuntu.com/security/notices/USN-6662-1
https://www.cve.org/CVERecord?id=CVE-2024-20921
https://www.oracle.com/security-alerts/cpujan2024.html
https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA
|
| java-1.8.0-openjdk |
CVE-2024-20926 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.402.b06-1.el7_9 |
https://access.redhat.com/errata/RHSA-2024:0266
https://access.redhat.com/security/cve/CVE-2024-20926
https://bugzilla.redhat.com/2257728
https://bugzilla.redhat.com/2257837
https://bugzilla.redhat.com/2257850
https://bugzilla.redhat.com/2257853
https://bugzilla.redhat.com/2257859
https://bugzilla.redhat.com/2257874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
https://errata.almalinux.org/9/ALSA-2024-0266.html
https://linux.oracle.com/cve/CVE-2024-20926.html
https://linux.oracle.com/errata/ELSA-2024-0266.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2024-20926
https://security.netapp.com/advisory/ntap-20240201-0002/
https://ubuntu.com/security/notices/USN-6660-1
https://www.cve.org/CVERecord?id=CVE-2024-20926
https://www.oracle.com/security-alerts/cpujan2024.html
https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA
|
| java-1.8.0-openjdk |
CVE-2024-20945 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.402.b06-1.el7_9 |
https://access.redhat.com/errata/RHSA-2024:0267
https://access.redhat.com/security/cve/CVE-2024-20945
https://bugzilla.redhat.com/2257720
https://bugzilla.redhat.com/2257728
https://bugzilla.redhat.com/2257837
https://bugzilla.redhat.com/2257853
https://bugzilla.redhat.com/2257859
https://bugzilla.redhat.com/2257874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
https://errata.almalinux.org/9/ALSA-2024-0267.html
https://linux.oracle.com/cve/CVE-2024-20945.html
https://linux.oracle.com/errata/ELSA-2024-0267.html
https://nvd.nist.gov/vuln/detail/CVE-2024-20945
https://ubuntu.com/security/notices/USN-6660-1
https://ubuntu.com/security/notices/USN-6661-1
https://ubuntu.com/security/notices/USN-6662-1
https://www.cve.org/CVERecord?id=CVE-2024-20945
https://www.oracle.com/security-alerts/cpujan2024.html
https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA
|
| java-1.8.0-openjdk |
CVE-2017-10053 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3832334.xml
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99842
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10053
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
https://linux.oracle.com/cve/CVE-2017-10053.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10053
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10053
|
| java-1.8.0-openjdk |
CVE-2017-10135 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99839
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/security/cve/CVE-2017-10135
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
https://linux.oracle.com/cve/CVE-2017-10135.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10135
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10135
|
| java-1.8.0-openjdk |
CVE-2017-10193 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99854
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/security/cve/CVE-2017-10193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
https://linux.oracle.com/cve/CVE-2017-10193.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10193
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://www.cve.org/CVERecord?id=CVE-2017-10193
|
| java-1.8.0-openjdk |
CVE-2017-10345 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101396
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
https://linux.oracle.com/cve/CVE-2017-10345.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10345
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10345
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk |
CVE-2017-3533 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.131-2.b11.el7_3 |
http://www.debian.org/security/2017/dsa-3858
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixJAVA
http://www.securityfocus.com/bid/97740
http://www.securitytracker.com/id/1038286
https://access.redhat.com/errata/RHSA-2017:1108
https://access.redhat.com/errata/RHSA-2017:1109
https://access.redhat.com/errata/RHSA-2017:1117
https://access.redhat.com/errata/RHSA-2017:1118
https://access.redhat.com/errata/RHSA-2017:1119
https://access.redhat.com/errata/RHSA-2017:1204
https://access.redhat.com/errata/RHSA-2017:1220
https://access.redhat.com/errata/RHSA-2017:1221
https://access.redhat.com/errata/RHSA-2017:1222
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-3533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
https://linux.oracle.com/cve/CVE-2017-3533.html
https://linux.oracle.com/errata/ELSA-2017-1204.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3533
https://security.gentoo.org/glsa/201705-03
https://security.gentoo.org/glsa/201707-01
https://ubuntu.com/security/notices/USN-3275-1
https://ubuntu.com/security/notices/USN-3275-2
https://www.cve.org/CVERecord?id=CVE-2017-3533
|
| java-1.8.0-openjdk |
CVE-2017-3544 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.131-2.b11.el7_3 |
http://www.debian.org/security/2017/dsa-3858
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixJAVA
http://www.securityfocus.com/bid/97745
http://www.securitytracker.com/id/1038286
https://access.redhat.com/errata/RHSA-2017:1108
https://access.redhat.com/errata/RHSA-2017:1109
https://access.redhat.com/errata/RHSA-2017:1117
https://access.redhat.com/errata/RHSA-2017:1118
https://access.redhat.com/errata/RHSA-2017:1119
https://access.redhat.com/errata/RHSA-2017:1204
https://access.redhat.com/errata/RHSA-2017:1220
https://access.redhat.com/errata/RHSA-2017:1221
https://access.redhat.com/errata/RHSA-2017:1222
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-3544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
https://linux.oracle.com/cve/CVE-2017-3544.html
https://linux.oracle.com/errata/ELSA-2017-1204.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3544
https://security.gentoo.org/glsa/201705-03
https://security.gentoo.org/glsa/201707-01
https://source.android.com/security/bulletin/2017-07-01
https://ubuntu.com/security/notices/USN-3275-1
https://ubuntu.com/security/notices/USN-3275-2
https://www.cve.org/CVERecord?id=CVE-2017-3544
|
| java-1.8.0-openjdk |
CVE-2018-2579 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102663
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2579.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2579
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2579
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk |
CVE-2018-2790 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103877
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2790.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2790
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2790
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk |
CVE-2019-2786 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.222.b10-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://access.redhat.com/errata/RHSA-2019:2585
https://access.redhat.com/errata/RHSA-2019:2590
https://access.redhat.com/errata/RHSA-2019:2592
https://access.redhat.com/errata/RHSA-2019:2737
https://access.redhat.com/security/cve/CVE-2019-2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786
https://linux.oracle.com/cve/CVE-2019-2786.html
https://linux.oracle.com/errata/ELSA-2019-1840.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2786
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
https://ubuntu.com/security/notices/USN-4080-1
https://ubuntu.com/security/notices/USN-4083-1
https://usn.ubuntu.com/4080-1/
https://usn.ubuntu.com/4083-1/
https://www.cve.org/CVERecord?id=CVE-2019-2786
https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/5572395.xml
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| java-1.8.0-openjdk |
CVE-2019-2945 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
https://linux.oracle.com/cve/CVE-2019-2945.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2945
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2945
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk |
CVE-2019-2962 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
https://linux.oracle.com/cve/CVE-2019-2962.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2962
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2962
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk |
CVE-2019-2964 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
https://linux.oracle.com/cve/CVE-2019-2964.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2964
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2964
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk |
CVE-2019-2973 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
https://linux.oracle.com/cve/CVE-2019-2973.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2973
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2973
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk |
CVE-2019-2981 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
https://linux.oracle.com/cve/CVE-2019-2981.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2981
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2981
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk |
CVE-2019-2983 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
https://linux.oracle.com/cve/CVE-2019-2983.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2983
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2983
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk |
CVE-2019-2987 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/security/cve/CVE-2019-2987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
https://linux.oracle.com/cve/CVE-2019-2987.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2987
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2987
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
https://www.oracle.com/security-alerts/cpuoct2019.html
|
| java-1.8.0-openjdk |
CVE-2019-2988 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
https://linux.oracle.com/cve/CVE-2019-2988.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2988
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2988
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk |
CVE-2019-2992 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
https://linux.oracle.com/cve/CVE-2019-2992.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2992
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2992
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk |
CVE-2019-2999 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
https://linux.oracle.com/cve/CVE-2019-2999.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2999
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2999
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk |
CVE-2020-14577 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
https://linux.oracle.com/cve/CVE-2020-14577.html
https://linux.oracle.com/errata/ELSA-2020-2985.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
https://nvd.nist.gov/vuln/detail/CVE-2020-14577
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4433-1
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4433-1/
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14577
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk |
CVE-2020-14779 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
https://linux.oracle.com/cve/CVE-2020-14779.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
https://nvd.nist.gov/vuln/detail/CVE-2020-14779
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14779
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk |
CVE-2020-14796 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
https://linux.oracle.com/cve/CVE-2020-14796.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14796
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14796
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2583 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0157
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0232
https://access.redhat.com/errata/RHSA-2020:0465
https://access.redhat.com/errata/RHSA-2020:0467
https://access.redhat.com/errata/RHSA-2020:0468
https://access.redhat.com/errata/RHSA-2020:0469
https://access.redhat.com/errata/RHSA-2020:0470
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2020-2583.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2583
https://seclists.org/bugtraq/2020/Feb/22
https://seclists.org/bugtraq/2020/Jan/24
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2583
https://www.debian.org/security/2020/dsa-4605
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2659 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0157
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0465
https://access.redhat.com/errata/RHSA-2020:0467
https://access.redhat.com/errata/RHSA-2020:0468
https://access.redhat.com/errata/RHSA-2020:0469
https://access.redhat.com/errata/RHSA-2020:0470
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
https://linux.oracle.com/cve/CVE-2020-2659.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2659
https://seclists.org/bugtraq/2020/Feb/22
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2659
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2754 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-2754.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2754
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2754
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2755 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-2755.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2755
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2755
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2756 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-2756.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2756
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2756
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk |
CVE-2020-2757 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-2757.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2757
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2757
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk |
CVE-2021-35588 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35588.json
https://access.redhat.com/security/cve/CVE-2021-35588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35588
https://linux.oracle.com/cve/CVE-2021-35588.html
https://linux.oracle.com/errata/ELSA-2021-3893.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://nvd.nist.gov/vuln/detail/CVE-2021-35588
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35588
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2021-35603 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
https://linux.oracle.com/cve/CVE-2021-35603.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://nvd.nist.gov/vuln/detail/CVE-2021-35603
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35603
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk |
CVE-2022-21619 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.352.b08-2.el7_9 |
https://access.redhat.com/errata/RHSA-2022:7013
https://access.redhat.com/security/cve/CVE-2022-21619
https://bugzilla.redhat.com/2133745
https://bugzilla.redhat.com/2133753
https://bugzilla.redhat.com/2133765
https://bugzilla.redhat.com/2133769
https://bugzilla.redhat.com/2133776
https://bugzilla.redhat.com/2133817
https://bugzilla.redhat.com/show_bug.cgi?id=2131863
https://bugzilla.redhat.com/show_bug.cgi?id=2133745
https://bugzilla.redhat.com/show_bug.cgi?id=2133753
https://bugzilla.redhat.com/show_bug.cgi?id=2133765
https://bugzilla.redhat.com/show_bug.cgi?id=2133769
https://bugzilla.redhat.com/show_bug.cgi?id=2133776
https://bugzilla.redhat.com/show_bug.cgi?id=2133817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
https://errata.almalinux.org/9/ALSA-2022-7013.html
https://errata.rockylinux.org/RLSA-2022:7012
https://linux.oracle.com/cve/CVE-2022-21619.html
https://linux.oracle.com/errata/ELSA-2022-7013.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
https://nvd.nist.gov/vuln/detail/CVE-2022-21619
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20221028-0012/
https://ubuntu.com/security/notices/USN-5719-1
https://www.cve.org/CVERecord?id=CVE-2022-21619
https://www.oracle.com/security-alerts/cpuoct2022.html
|
| java-1.8.0-openjdk |
CVE-2022-21624 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.352.b08-2.el7_9 |
https://access.redhat.com/errata/RHSA-2022:7013
https://access.redhat.com/security/cve/CVE-2022-21624
https://bugzilla.redhat.com/2133745
https://bugzilla.redhat.com/2133753
https://bugzilla.redhat.com/2133765
https://bugzilla.redhat.com/2133769
https://bugzilla.redhat.com/2133776
https://bugzilla.redhat.com/2133817
https://bugzilla.redhat.com/show_bug.cgi?id=2131863
https://bugzilla.redhat.com/show_bug.cgi?id=2133745
https://bugzilla.redhat.com/show_bug.cgi?id=2133753
https://bugzilla.redhat.com/show_bug.cgi?id=2133765
https://bugzilla.redhat.com/show_bug.cgi?id=2133769
https://bugzilla.redhat.com/show_bug.cgi?id=2133776
https://bugzilla.redhat.com/show_bug.cgi?id=2133817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
https://errata.almalinux.org/9/ALSA-2022-7013.html
https://errata.rockylinux.org/RLSA-2022:7012
https://linux.oracle.com/cve/CVE-2022-21624.html
https://linux.oracle.com/errata/ELSA-2022-7013.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
https://nvd.nist.gov/vuln/detail/CVE-2022-21624
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20221028-0012/
https://ubuntu.com/security/notices/USN-5719-1
https://www.cve.org/CVERecord?id=CVE-2022-21624
https://www.oracle.com/security-alerts/cpuoct2022.html
|
| java-1.8.0-openjdk |
CVE-2023-21843 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.362.b08-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:0210
https://access.redhat.com/security/cve/CVE-2023-21843
https://bugzilla.redhat.com/2160475
https://bugzilla.redhat.com/2160490
https://bugzilla.redhat.com/show_bug.cgi?id=2159912
https://bugzilla.redhat.com/show_bug.cgi?id=2160475
https://bugzilla.redhat.com/show_bug.cgi?id=2160490
https://bugzilla.redhat.com/show_bug.cgi?id=2163594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
https://errata.almalinux.org/9/ALSA-2023-0210.html
https://errata.rockylinux.org/RLSA-2023:0210
https://linux.oracle.com/cve/CVE-2023-21843.html
https://linux.oracle.com/errata/ELSA-2023-0210.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21843
https://security.gentoo.org/glsa/202401-25
https://ubuntu.com/security/notices/USN-5897-1
https://ubuntu.com/security/notices/USN-5898-1
https://www.cve.org/CVERecord?id=CVE-2023-21843
https://www.oracle.com/security-alerts/cpujan2023.html
|
| java-1.8.0-openjdk |
CVE-2023-21937 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21937
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21937.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21937
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21937
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk |
CVE-2023-21938 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21938
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21938.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21938
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21938
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk |
CVE-2023-21968 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21968
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21968.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21968
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21968
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk |
CVE-2023-22045 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.382.b05-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:4178
https://access.redhat.com/security/cve/CVE-2023-22045
https://bugzilla.redhat.com/2221645
https://bugzilla.redhat.com/2221647
https://bugzilla.redhat.com/show_bug.cgi?id=2220662
https://bugzilla.redhat.com/show_bug.cgi?id=2221645
https://bugzilla.redhat.com/show_bug.cgi?id=2221647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
https://errata.almalinux.org/9/ALSA-2023-4178.html
https://errata.rockylinux.org/RLSA-2023:4178
https://linux.oracle.com/cve/CVE-2023-22045.html
https://linux.oracle.com/errata/ELSA-2023-4233.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-22045
https://security.netapp.com/advisory/ntap-20230725-0006/
https://ubuntu.com/security/notices/USN-6263-1
https://ubuntu.com/security/notices/USN-6272-1
https://www.cve.org/CVERecord?id=CVE-2023-22045
https://www.debian.org/security/2023/dsa-5458
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpujul2023.html
|
| java-1.8.0-openjdk-headless |
CVE-2016-3587 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91904
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/security/cve/CVE-2016-3587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3587
https://linux.oracle.com/cve/CVE-2016-3587.html
https://linux.oracle.com/errata/ELSA-2016-1458.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3587
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://www.cve.org/CVERecord?id=CVE-2016-3587
|
| java-1.8.0-openjdk-headless |
CVE-2016-3598 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00006.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://rhn.redhat.com/errata/RHSA-2016-1587.html
http://rhn.redhat.com/errata/RHSA-2016-1588.html
http://rhn.redhat.com/errata/RHSA-2016-1589.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91918
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-3598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598
https://linux.oracle.com/cve/CVE-2016-3598.html
https://linux.oracle.com/errata/ELSA-2016-1504.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3598
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://www.cve.org/CVERecord?id=CVE-2016-3598
|
| java-1.8.0-openjdk-headless |
CVE-2016-3606 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://rhn.redhat.com/errata/RHSA-2016-1776.html
http://www.debian.org/security/2016/dsa-3641
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91912
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
http://www.ubuntu.com/usn/USN-3077-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/errata/RHSA-2016:1476
https://access.redhat.com/security/cve/CVE-2016-3606
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-3606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606
https://linux.oracle.com/cve/CVE-2016-3606.html
https://linux.oracle.com/errata/ELSA-2016-1776.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3606
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://ubuntu.com/security/notices/USN-3077-1
https://www.cve.org/CVERecord?id=CVE-2016-3606
|
| java-1.8.0-openjdk-headless |
CVE-2016-3610 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91930
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/security/cve/CVE-2016-3610
https://bugzilla.redhat.com/show_bug.cgi?id=1356994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610
https://linux.oracle.com/cve/CVE-2016-3610.html
https://linux.oracle.com/errata/ELSA-2016-1504.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3610
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://www.cve.org/CVERecord?id=CVE-2016-3610
|
| java-1.8.0-openjdk-headless |
CVE-2016-5582 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.111-1.b15.el7_2 |
http://hg.openjdk.java.net/jdk8u/jdk8u/hotspot/rev/a3ede966ecfe
http://rhn.redhat.com/errata/RHSA-2016-2079.html
http://rhn.redhat.com/errata/RHSA-2016-2088.html
http://rhn.redhat.com/errata/RHSA-2016-2089.html
http://rhn.redhat.com/errata/RHSA-2016-2090.html
http://rhn.redhat.com/errata/RHSA-2016-2658.html
http://rhn.redhat.com/errata/RHSA-2017-0061.html
http://www.debian.org/security/2016/dsa-3707
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
http://www.securityfocus.com/bid/93623
http://www.securitytracker.com/id/1037040
http://www.ubuntu.com/usn/USN-3130-1
http://www.ubuntu.com/usn/USN-3154-1
https://access.redhat.com/security/cve/CVE-2016-5582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582
https://linux.oracle.com/cve/CVE-2016-5582.html
https://linux.oracle.com/errata/ELSA-2017-0061.html
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-5582
https://security.gentoo.org/glsa/201611-04
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20161019-0001/
https://ubuntu.com/security/notices/USN-3121-1
https://ubuntu.com/security/notices/USN-3130-1
https://ubuntu.com/security/notices/USN-3154-1
https://www.cve.org/CVERecord?id=CVE-2016-5582
|
| java-1.8.0-openjdk-headless |
CVE-2017-10074 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99731
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/security/cve/CVE-2017-10074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074
https://linux.oracle.com/cve/CVE-2017-10074.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10074
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10074
|
| java-1.8.0-openjdk-headless |
CVE-2017-10087 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99703
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087
https://linux.oracle.com/cve/CVE-2017-10087.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10087
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10087
|
| java-1.8.0-openjdk-headless |
CVE-2017-10089 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99659
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089
https://linux.oracle.com/cve/CVE-2017-10089.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10089
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10089
|
| java-1.8.0-openjdk-headless |
CVE-2017-10090 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99706
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090
https://linux.oracle.com/cve/CVE-2017-10090.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10090
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10090
|
| java-1.8.0-openjdk-headless |
CVE-2017-10096 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99670
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096
https://linux.oracle.com/cve/CVE-2017-10096.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10096
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10096
|
| java-1.8.0-openjdk-headless |
CVE-2017-10101 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99674
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10101
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101
https://linux.oracle.com/cve/CVE-2017-10101.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10101
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10101
|
| java-1.8.0-openjdk-headless |
CVE-2017-10102 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99712
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10102
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102
https://linux.oracle.com/cve/CVE-2017-10102.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10102
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10102
|
| java-1.8.0-openjdk-headless |
CVE-2017-10107 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99719
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10107
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107
https://linux.oracle.com/cve/CVE-2017-10107.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10107
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10107
|
| java-1.8.0-openjdk-headless |
CVE-2017-10110 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99643
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10110
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110
https://linux.oracle.com/cve/CVE-2017-10110.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10110
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10110
|
| java-1.8.0-openjdk-headless |
CVE-2017-10111 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99707
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/security/cve/CVE-2017-10111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111
https://linux.oracle.com/cve/CVE-2017-10111.html
https://linux.oracle.com/errata/ELSA-2017-1789.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10111
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://www.cve.org/CVERecord?id=CVE-2017-10111
|
| java-1.8.0-openjdk-headless |
CVE-2017-10285 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101319
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285
https://linux.oracle.com/cve/CVE-2017-10285.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10285
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10285
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
|
| java-1.8.0-openjdk-headless |
CVE-2017-10346 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101315
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346
https://linux.oracle.com/cve/CVE-2017-10346.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10346
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10346
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
|
| java-1.8.0-openjdk-headless |
CVE-2017-3241 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/09c05d3bf23e
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/75f31e0bd829
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95488
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241
https://erpscan.io/advisories/erpscan-17-006-oracle-openjdk-java-serialization-dos-vulnerability/
https://linux.oracle.com/cve/CVE-2017-3241.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3241
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2017-3241
https://www.exploit-db.com/exploits/41145/
|
| java-1.8.0-openjdk-headless |
CVE-2017-3272 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5b2b1dadd53c
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95533
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272
https://linux.oracle.com/cve/CVE-2017-3272.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3272
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2017-3272
|
| java-1.8.0-openjdk-headless |
CVE-2017-3289 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/hotspot/rev/02a3d0dcbedd
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95525
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289
https://linux.oracle.com/cve/CVE-2017-3289.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3289
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://www.cve.org/CVERecord?id=CVE-2017-3289
|
| java-1.8.0-openjdk-headless |
CVE-2018-2814 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103798
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/security/cve/CVE-2018-2814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2814.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2814
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2814
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk-headless |
CVE-2018-3169 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105587
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3000
https://access.redhat.com/errata/RHSA-2018:3001
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3350
https://access.redhat.com/errata/RHSA-2018:3409
https://access.redhat.com/errata/RHSA-2018:3521
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3671
https://access.redhat.com/errata/RHSA-2018:3672
https://access.redhat.com/errata/RHSA-2018:3779
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3169
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169
https://linux.oracle.com/cve/CVE-2018-3169.html
https://linux.oracle.com/errata/ELSA-2018-3521.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3169
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://ubuntu.com/security/notices/USN-3824-1
https://usn.ubuntu.com/3804-1/
https://usn.ubuntu.com/3824-1/
https://www.cve.org/CVERecord?id=CVE-2018-3169
https://www.debian.org/security/2018/dsa-4326
|
| java-1.8.0-openjdk-headless |
CVE-2018-3183 |
CRITICAL |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105622
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3521
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183
https://linux.oracle.com/cve/CVE-2018-3183.html
https://linux.oracle.com/errata/ELSA-2018-3521.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3183
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://usn.ubuntu.com/3804-1/
https://www.cve.org/CVERecord?id=CVE-2018-3183
https://www.debian.org/security/2018/dsa-4326
|
| java-1.8.0-openjdk-headless |
CVE-2016-5548 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/3647a1ee5681
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95559
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5548
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548
https://linux.oracle.com/cve/CVE-2016-5548.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5548
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2016-5548
|
| java-1.8.0-openjdk-headless |
CVE-2016-5573 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.111-1.b15.el7_2 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/e47a4a3f3e54
http://rhn.redhat.com/errata/RHSA-2016-2079.html
http://rhn.redhat.com/errata/RHSA-2016-2088.html
http://rhn.redhat.com/errata/RHSA-2016-2089.html
http://rhn.redhat.com/errata/RHSA-2016-2090.html
http://rhn.redhat.com/errata/RHSA-2016-2136.html
http://rhn.redhat.com/errata/RHSA-2016-2137.html
http://rhn.redhat.com/errata/RHSA-2016-2138.html
http://rhn.redhat.com/errata/RHSA-2016-2658.html
http://rhn.redhat.com/errata/RHSA-2016-2659.html
http://rhn.redhat.com/errata/RHSA-2017-0061.html
http://www.debian.org/security/2016/dsa-3707
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
http://www.securityfocus.com/bid/93628
http://www.securitytracker.com/id/1037040
http://www.ubuntu.com/usn/USN-3130-1
http://www.ubuntu.com/usn/USN-3154-1
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5573
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573
https://linux.oracle.com/cve/CVE-2016-5573.html
https://linux.oracle.com/errata/ELSA-2017-0061.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5573
https://security.gentoo.org/glsa/201611-04
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20161019-0001/
https://ubuntu.com/security/notices/USN-3121-1
https://ubuntu.com/security/notices/USN-3130-1
https://ubuntu.com/security/notices/USN-3154-1
https://www.cve.org/CVERecord?id=CVE-2016-5573
|
| java-1.8.0-openjdk-headless |
CVE-2017-10067 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99756
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067
https://linux.oracle.com/cve/CVE-2017-10067.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10067
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10067
|
| java-1.8.0-openjdk-headless |
CVE-2017-10078 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99752
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10078
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078
https://linux.oracle.com/cve/CVE-2017-10078.html
https://linux.oracle.com/errata/ELSA-2017-1789.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10078
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://www.cve.org/CVERecord?id=CVE-2017-10078
|
| java-1.8.0-openjdk-headless |
CVE-2017-10116 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99734
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10116
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116
https://linux.oracle.com/cve/CVE-2017-10116.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10116
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10116
|
| java-1.8.0-openjdk-headless |
CVE-2017-10274 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101333
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/security/cve/CVE-2017-10274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274
https://linux.oracle.com/cve/CVE-2017-10274.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10274
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10274
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
|
| java-1.8.0-openjdk-headless |
CVE-2017-10388 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101321
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388
https://linux.oracle.com/cve/CVE-2017-10388.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10388
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10388
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
https://www.orpheus-lyre.info/
https://www.synology.com/support/security/Synology_SA_17_66_OpenJDK
|
| java-1.8.0-openjdk-headless |
CVE-2018-2582 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102597
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/security/cve/CVE-2018-2582
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2582.html
https://linux.oracle.com/errata/ELSA-2018-0095.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2582
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://usn.ubuntu.com/3613-1/
https://www.cve.org/CVERecord?id=CVE-2018-2582
https://www.debian.org/security/2018/dsa-4144
|
| java-1.8.0-openjdk-headless |
CVE-2018-2633 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102557
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2633
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2633.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2633
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2633
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2634 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102592
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2634
https://bugs.openjdk.java.net/browse/JDK-6560359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2634.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2634
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2634
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2637 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102576
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2637.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2637
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2637
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2641 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102605
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2641
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2641.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2641
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2641
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2794 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/java/javase/8u171-relnotes-4308888.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103817
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2794.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2794
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2794
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk-headless |
CVE-2018-3149 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105608
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3000
https://access.redhat.com/errata/RHSA-2018:3001
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3007
https://access.redhat.com/errata/RHSA-2018:3008
https://access.redhat.com/errata/RHSA-2018:3350
https://access.redhat.com/errata/RHSA-2018:3409
https://access.redhat.com/errata/RHSA-2018:3521
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3671
https://access.redhat.com/errata/RHSA-2018:3672
https://access.redhat.com/errata/RHSA-2018:3779
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149
https://linux.oracle.com/cve/CVE-2018-3149.html
https://linux.oracle.com/errata/ELSA-2018-3521.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3149
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://ubuntu.com/security/notices/USN-3824-1
https://usn.ubuntu.com/3804-1/
https://usn.ubuntu.com/3824-1/
https://www.cve.org/CVERecord?id=CVE-2018-3149
https://www.debian.org/security/2018/dsa-4326
|
| java-1.8.0-openjdk-headless |
CVE-2018-3639 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-8.b10.el7_5 |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html
http://support.lenovo.com/us/en/solutions/LEN-22133
http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html
http://www.openwall.com/lists/oss-security/2020/06/10/1
http://www.openwall.com/lists/oss-security/2020/06/10/2
http://www.openwall.com/lists/oss-security/2020/06/10/5
http://www.securityfocus.com/bid/104232
http://www.securitytracker.com/id/1040949
http://www.securitytracker.com/id/1042004
http://xenbits.xen.org/xsa/advisory-263.html
https://access.redhat.com/errata/RHSA-2018:1629
https://access.redhat.com/errata/RHSA-2018:1630
https://access.redhat.com/errata/RHSA-2018:1632
https://access.redhat.com/errata/RHSA-2018:1633
https://access.redhat.com/errata/RHSA-2018:1635
https://access.redhat.com/errata/RHSA-2018:1636
https://access.redhat.com/errata/RHSA-2018:1637
https://access.redhat.com/errata/RHSA-2018:1638
https://access.redhat.com/errata/RHSA-2018:1639
https://access.redhat.com/errata/RHSA-2018:1640
https://access.redhat.com/errata/RHSA-2018:1641
https://access.redhat.com/errata/RHSA-2018:1642
https://access.redhat.com/errata/RHSA-2018:1643
https://access.redhat.com/errata/RHSA-2018:1644
https://access.redhat.com/errata/RHSA-2018:1645
https://access.redhat.com/errata/RHSA-2018:1646
https://access.redhat.com/errata/RHSA-2018:1647
https://access.redhat.com/errata/RHSA-2018:1648
https://access.redhat.com/errata/RHSA-2018:1649
https://access.redhat.com/errata/RHSA-2018:1650
https://access.redhat.com/errata/RHSA-2018:1651
https://access.redhat.com/errata/RHSA-2018:1652
https://access.redhat.com/errata/RHSA-2018:1653
https://access.redhat.com/errata/RHSA-2018:1654
https://access.redhat.com/errata/RHSA-2018:1655
https://access.redhat.com/errata/RHSA-2018:1656
https://access.redhat.com/errata/RHSA-2018:1657
https://access.redhat.com/errata/RHSA-2018:1658
https://access.redhat.com/errata/RHSA-2018:1659
https://access.redhat.com/errata/RHSA-2018:1660
https://access.redhat.com/errata/RHSA-2018:1661
https://access.redhat.com/errata/RHSA-2018:1662
https://access.redhat.com/errata/RHSA-2018:1663
https://access.redhat.com/errata/RHSA-2018:1664
https://access.redhat.com/errata/RHSA-2018:1665
https://access.redhat.com/errata/RHSA-2018:1666
https://access.redhat.com/errata/RHSA-2018:1667
https://access.redhat.com/errata/RHSA-2018:1668
https://access.redhat.com/errata/RHSA-2018:1669
https://access.redhat.com/errata/RHSA-2018:1674
https://access.redhat.com/errata/RHSA-2018:1675
https://access.redhat.com/errata/RHSA-2018:1676
https://access.redhat.com/errata/RHSA-2018:1686
https://access.redhat.com/errata/RHSA-2018:1688
https://access.redhat.com/errata/RHSA-2018:1689
https://access.redhat.com/errata/RHSA-2018:1690
https://access.redhat.com/errata/RHSA-2018:1696
https://access.redhat.com/errata/RHSA-2018:1710
https://access.redhat.com/errata/RHSA-2018:1711
https://access.redhat.com/errata/RHSA-2018:1737
https://access.redhat.com/errata/RHSA-2018:1738
https://access.redhat.com/errata/RHSA-2018:1826
https://access.redhat.com/errata/RHSA-2018:1854
https://access.redhat.com/errata/RHSA-2018:1965
https://access.redhat.com/errata/RHSA-2018:1967
https://access.redhat.com/errata/RHSA-2018:1997
https://access.redhat.com/errata/RHSA-2018:2001
https://access.redhat.com/errata/RHSA-2018:2003
https://access.redhat.com/errata/RHSA-2018:2006
https://access.redhat.com/errata/RHSA-2018:2060
https://access.redhat.com/errata/RHSA-2018:2161
https://access.redhat.com/errata/RHSA-2018:2162
https://access.redhat.com/errata/RHSA-2018:2164
https://access.redhat.com/errata/RHSA-2018:2171
https://access.redhat.com/errata/RHSA-2018:2172
https://access.redhat.com/errata/RHSA-2018:2216
https://access.redhat.com/errata/RHSA-2018:2228
https://access.redhat.com/errata/RHSA-2018:2246
https://access.redhat.com/errata/RHSA-2018:2250
https://access.redhat.com/errata/RHSA-2018:2258
https://access.redhat.com/errata/RHSA-2018:2289
https://access.redhat.com/errata/RHSA-2018:2309
https://access.redhat.com/errata/RHSA-2018:2328
https://access.redhat.com/errata/RHSA-2018:2363
https://access.redhat.com/errata/RHSA-2018:2364
https://access.redhat.com/errata/RHSA-2018:2387
https://access.redhat.com/errata/RHSA-2018:2394
https://access.redhat.com/errata/RHSA-2018:2396
https://access.redhat.com/errata/RHSA-2018:2948
https://access.redhat.com/errata/RHSA-2018:3396
https://access.redhat.com/errata/RHSA-2018:3397
https://access.redhat.com/errata/RHSA-2018:3398
https://access.redhat.com/errata/RHSA-2018:3399
https://access.redhat.com/errata/RHSA-2018:3400
https://access.redhat.com/errata/RHSA-2018:3401
https://access.redhat.com/errata/RHSA-2018:3402
https://access.redhat.com/errata/RHSA-2018:3407
https://access.redhat.com/errata/RHSA-2018:3423
https://access.redhat.com/errata/RHSA-2018:3424
https://access.redhat.com/errata/RHSA-2018:3425
https://access.redhat.com/errata/RHSA-2019:0148
https://access.redhat.com/errata/RHSA-2019:1046
https://access.redhat.com/security/cve/CVE-2018-3639
https://access.redhat.com/security/vulnerabilities/ssbd
https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-3639.html
https://linux.oracle.com/errata/ELSA-2019-4585.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3639
https://nvidia.custhelp.com/app/answers/detail/a_id/4787
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004
https://seclists.org/bugtraq/2019/Jun/36
https://security.netapp.com/advisory/ntap-20180521-0001/
https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf
https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf
https://support.citrix.com/article/CTX235225
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us
https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel
https://ubuntu.com/security/notices/USN-3651-1
https://ubuntu.com/security/notices/USN-3652-1
https://ubuntu.com/security/notices/USN-3653-1
https://ubuntu.com/security/notices/USN-3653-2
https://ubuntu.com/security/notices/USN-3654-1
https://ubuntu.com/security/notices/USN-3654-2
https://ubuntu.com/security/notices/USN-3655-1
https://ubuntu.com/security/notices/USN-3655-2
https://ubuntu.com/security/notices/USN-3679-1
https://ubuntu.com/security/notices/USN-3680-1
https://ubuntu.com/security/notices/USN-3756-1
https://ubuntu.com/security/notices/USN-3777-3
https://usn.ubuntu.com/3651-1/
https://usn.ubuntu.com/3652-1/
https://usn.ubuntu.com/3653-1/
https://usn.ubuntu.com/3653-2/
https://usn.ubuntu.com/3654-1/
https://usn.ubuntu.com/3654-2/
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
https://usn.ubuntu.com/3679-1/
https://usn.ubuntu.com/3680-1/
https://usn.ubuntu.com/3756-1/
https://usn.ubuntu.com/3777-3/
https://www.cve.org/CVERecord?id=CVE-2018-3639
https://www.debian.org/security/2018/dsa-4210
https://www.debian.org/security/2018/dsa-4273
https://www.exploit-db.com/exploits/44695/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
https://www.kb.cert.org/vuls/id/180049
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.synology.com/support/security/Synology_SA_18_23
https://www.us-cert.gov/ncas/alerts/TA18-141A
|
| java-1.8.0-openjdk-headless |
CVE-2019-2698 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.212.b04-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://access.redhat.com/errata/RHBA-2019:0959
https://access.redhat.com/errata/RHSA-2019:1146
https://access.redhat.com/errata/RHSA-2019:1163
https://access.redhat.com/errata/RHSA-2019:1164
https://access.redhat.com/errata/RHSA-2019:1165
https://access.redhat.com/errata/RHSA-2019:1166
https://access.redhat.com/errata/RHSA-2019:1238
https://access.redhat.com/errata/RHSA-2019:1325
https://access.redhat.com/security/cve/CVE-2019-2698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2698
https://linux.oracle.com/cve/CVE-2019-2698.html
https://linux.oracle.com/errata/ELSA-2019-1146.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2698
https://seclists.org/bugtraq/2019/May/75
https://security.gentoo.org/glsa/201908-10
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us
https://ubuntu.com/security/notices/USN-3975-1
https://usn.ubuntu.com/3975-1/
https://www.cve.org/CVERecord?id=CVE-2019-2698
https://www.debian.org/security/2019/dsa-4453
|
| java-1.8.0-openjdk-headless |
CVE-2019-2949 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/security/cve/CVE-2019-2949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2949
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2019-2949.html
https://linux.oracle.com/errata/ELSA-2019-3136.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2949
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://support.f5.com/csp/article/K54213762?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2949
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk-headless |
CVE-2020-14583 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14583
https://linux-qa.oracle.com/cve/CVE-2020-14583.html
https://linux-qa.oracle.com/errata/ELSA-2020-5807.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
https://nvd.nist.gov/vuln/detail/CVE-2020-14583
https://security.gentoo.org/glsa/202008-24
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4433-1
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4433-1/
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14583
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-14593 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14593
https://linux.oracle.com/cve/CVE-2020-14593.html
https://linux.oracle.com/errata/ELSA-2020-2985.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
https://nvd.nist.gov/vuln/detail/CVE-2020-14593
https://security.gentoo.org/glsa/202008-24
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4433-1
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4433-1/
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14593
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2601 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0157
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0232
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2601
https://linux.oracle.com/cve/CVE-2020-2601.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2601
https://seclists.org/bugtraq/2020/Feb/22
https://seclists.org/bugtraq/2020/Jan/24
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2601
https://www.debian.org/security/2020/dsa-4605
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2604 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0232
https://access.redhat.com/errata/RHSA-2020:0465
https://access.redhat.com/errata/RHSA-2020:0467
https://access.redhat.com/errata/RHSA-2020:0468
https://access.redhat.com/errata/RHSA-2020:0469
https://access.redhat.com/errata/RHSA-2020:0470
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2604
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2604
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2020-2604.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2604
https://seclists.org/bugtraq/2020/Feb/22
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2604
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.oracle.com/technetwork/java/javase/11-0-6-oracle-relnotes-5813175.html
https://www.oracle.com/technetwork/java/javase/13-0-2-relnotes-5812268.html
https://www.oracle.com/technetwork/java/javase/8u241-relnotes-5813177.html
https://www.oracle.com/technetwork/java/javaseproducts/documentation/javase7supportreleasenotes-1601161.html#R170_251
|
| java-1.8.0-openjdk-headless |
CVE-2020-2803 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2803
https://linux.oracle.com/cve/CVE-2020-2803.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2803
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2803
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2805 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2805
https://linux.oracle.com/cve/CVE-2020-2805.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2805
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2805
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-2388 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.302.b08-0.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json
https://access.redhat.com/security/cve/CVE-2021-2388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388
https://linux.oracle.com/cve/CVE-2021-2388.html
https://linux.oracle.com/errata/ELSA-2021-2845.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2021-2388
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20210723-0002/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-2388
https://www.debian.org/security/2021/dsa-4946
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-35565 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35588.json
https://access.redhat.com/security/cve/CVE-2021-35565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565
https://linux.oracle.com/cve/CVE-2021-35565.html
https://linux.oracle.com/errata/ELSA-2021-3893.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
https://nvd.nist.gov/vuln/detail/CVE-2021-35565
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35565
https://www.debian.org/security/2021/dsa-5000
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-35567 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35567
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567
https://linux.oracle.com/cve/CVE-2021-35567.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://nvd.nist.gov/vuln/detail/CVE-2021-35567
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35567
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21476 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.332.b09-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
https://access.redhat.com/security/cve/CVE-2022-21476
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476
https://errata.almalinux.org/8/ALSA-2022-1491.html
https://linux.oracle.com/cve/CVE-2022-21476.html
https://linux.oracle.com/errata/ELSA-2022-2137.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21476
https://security.netapp.com/advisory/ntap-20220429-0006/
https://ubuntu.com/security/notices/USN-5388-1
https://ubuntu.com/security/notices/USN-5388-2
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21476
https://www.debian.org/security/2022/dsa-5128
https://www.debian.org/security/2022/dsa-5131
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-34169 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.342.b07-1.el7_9 |
http://packetstormsecurity.com/files/168186/Xalan-J-XSLTC-Integer-Truncation.html
http://www.openwall.com/lists/oss-security/2022/07/19/5
http://www.openwall.com/lists/oss-security/2022/07/19/6
http://www.openwall.com/lists/oss-security/2022/07/20/2
http://www.openwall.com/lists/oss-security/2022/07/20/3
http://www.openwall.com/lists/oss-security/2022/10/18/2
http://www.openwall.com/lists/oss-security/2022/11/04/8
http://www.openwall.com/lists/oss-security/2022/11/07/2
https://access.redhat.com/errata/RHSA-2022:5736
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21549.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
https://access.redhat.com/security/cve/CVE-2022-34169
https://bugzilla.redhat.com/2108540
https://bugzilla.redhat.com/2108543
https://bugzilla.redhat.com/2108547
https://bugzilla.redhat.com/2108554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169
https://errata.almalinux.org/9/ALSA-2022-5736.html
https://gitbox.apache.org/repos/asf?p=xalan-java.git
https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81
https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=ab57211e5d2e97cbed06786f919fa9b749c83573
https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=da3e0d06b467247643ce04e88d3346739d119f21
https://github.com/openjdk/jdk/commit/41ef2b249073450172e11163a4d05762364b1297
https://linux.oracle.com/cve/CVE-2022-34169.html
https://linux.oracle.com/errata/ELSA-2022-5736.html
https://lists.apache.org/thread/12pxy4phsry6c34x2ol4fft6xlho4kyw
https://lists.apache.org/thread/2qvl7r43wb4t8p9dd9om1bnkssk07sn8
https://lists.apache.org/thread/x3f7xv3p1g32qj2hlg8wd57pwcpld471
https://lists.debian.org/debian-lts-announce/2022/10/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB
https://marc.info/?l=oss-security&m=165825217622132
https://nvd.nist.gov/vuln/detail/CVE-2022-34169
https://openjdk.org/groups/vulnerability/advisories/2022-07-19
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20220729-0009
https://security.netapp.com/advisory/ntap-20220729-0009/
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-34169
https://www.debian.org/security/2022/dsa-5188
https://www.debian.org/security/2022/dsa-5192
https://www.debian.org/security/2022/dsa-5256
https://www.oracle.com/security-alerts/cpujul2022.html
https://xalan.apache.org
|
| java-1.8.0-openjdk-headless |
CVE-2023-21930 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21930
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21930.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21930
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21930
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk-headless |
CVE-2024-20918 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.402.b06-1.el7_9 |
https://access.redhat.com/errata/RHSA-2024:0267
https://access.redhat.com/security/cve/CVE-2024-20918
https://bugzilla.redhat.com/2257720
https://bugzilla.redhat.com/2257728
https://bugzilla.redhat.com/2257837
https://bugzilla.redhat.com/2257853
https://bugzilla.redhat.com/2257859
https://bugzilla.redhat.com/2257874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918
https://errata.almalinux.org/9/ALSA-2024-0267.html
https://linux.oracle.com/cve/CVE-2024-20918.html
https://linux.oracle.com/errata/ELSA-2024-0267.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2024-20918
https://security.netapp.com/advisory/ntap-20240201-0002/
https://ubuntu.com/security/notices/USN-6660-1
https://ubuntu.com/security/notices/USN-6661-1
https://ubuntu.com/security/notices/USN-6662-1
https://www.cve.org/CVERecord?id=CVE-2024-20918
https://www.oracle.com/security-alerts/cpujan2024.html
https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA
|
| java-1.8.0-openjdk-headless |
CVE-2024-20952 |
HIGH |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.402.b06-1.el7_9 |
https://access.redhat.com/errata/RHSA-2024:0267
https://access.redhat.com/security/cve/CVE-2024-20952
https://bugzilla.redhat.com/2257720
https://bugzilla.redhat.com/2257728
https://bugzilla.redhat.com/2257837
https://bugzilla.redhat.com/2257853
https://bugzilla.redhat.com/2257859
https://bugzilla.redhat.com/2257874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952
https://errata.almalinux.org/9/ALSA-2024-0267.html
https://linux.oracle.com/cve/CVE-2024-20952.html
https://linux.oracle.com/errata/ELSA-2024-0267.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2024-20952
https://security.netapp.com/advisory/ntap-20240201-0002/
https://ubuntu.com/security/notices/USN-6660-1
https://ubuntu.com/security/notices/USN-6661-1
https://ubuntu.com/security/notices/USN-6662-1
https://www.cve.org/CVERecord?id=CVE-2024-20952
https://www.oracle.com/security-alerts/cpujan2024.html
https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA
|
| java-1.8.0-openjdk-headless |
CVE-2016-10165 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.111-1.b15.el7_2 |
http://lists.opensuse.org/opensuse-updates/2017-01/msg00174.html
http://rhn.redhat.com/errata/RHSA-2016-2079.html
http://rhn.redhat.com/errata/RHSA-2016-2658.html
http://www.debian.org/security/2017/dsa-3774
http://www.openwall.com/lists/oss-security/2016/08/15/9
http://www.openwall.com/lists/oss-security/2017/01/23/1
http://www.openwall.com/lists/oss-security/2017/01/25/14
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/95808
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2016-10165
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10165
https://github.com/mm2/Little-CMS/commit/5ca71a7bc18b6897ab21d815d15e218e204581e2
https://nvd.nist.gov/vuln/detail/CVE-2016-10165
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3770-1
https://ubuntu.com/security/notices/USN-3770-2
https://usn.ubuntu.com/3770-1/
https://usn.ubuntu.com/3770-2/
https://www.cve.org/CVERecord?id=CVE-2016-10165
|
| java-1.8.0-openjdk-headless |
CVE-2016-3458 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://rhn.redhat.com/errata/RHSA-2016-1776.html
http://www.debian.org/security/2016/dsa-3641
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91945
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
http://www.ubuntu.com/usn/USN-3077-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/errata/RHSA-2016:1476
https://access.redhat.com/errata/RHSA-2016:1477
https://access.redhat.com/security/cve/CVE-2016-3458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458
https://linux.oracle.com/cve/CVE-2016-3458.html
https://linux.oracle.com/errata/ELSA-2016-1776.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3458
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://ubuntu.com/security/notices/USN-3077-1
https://www.cve.org/CVERecord?id=CVE-2016-3458
|
| java-1.8.0-openjdk-headless |
CVE-2016-3500 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://rhn.redhat.com/errata/RHSA-2016-1776.html
http://www.debian.org/security/2016/dsa-3641
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
http://www.ubuntu.com/usn/USN-3077-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/errata/RHSA-2016:1476
https://access.redhat.com/errata/RHSA-2016:1477
https://access.redhat.com/security/cve/CVE-2016-3500
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-3500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500
https://kc.mcafee.com/corporate/index?page=content&id=SB10166
https://linux.oracle.com/cve/CVE-2016-3500.html
https://linux.oracle.com/errata/ELSA-2016-1776.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3500
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://ubuntu.com/security/notices/USN-3077-1
https://www.cve.org/CVERecord?id=CVE-2016-3500
|
| java-1.8.0-openjdk-headless |
CVE-2016-3508 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://rhn.redhat.com/errata/RHSA-2016-1776.html
http://www.debian.org/security/2016/dsa-3641
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91972
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
http://www.ubuntu.com/usn/USN-3077-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/errata/RHSA-2016:1476
https://access.redhat.com/errata/RHSA-2016:1477
https://access.redhat.com/security/cve/CVE-2016-3508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508
https://kc.mcafee.com/corporate/index?page=content&id=SB10166
https://linux.oracle.com/cve/CVE-2016-3508.html
https://linux.oracle.com/errata/ELSA-2016-1776.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3508
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://ubuntu.com/security/notices/USN-3077-1
https://www.cve.org/CVERecord?id=CVE-2016-3508
|
| java-1.8.0-openjdk-headless |
CVE-2016-3550 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.101-3.b13.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00035.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00028.html
http://rhn.redhat.com/errata/RHSA-2016-1504.html
http://rhn.redhat.com/errata/RHSA-2016-1776.html
http://www.debian.org/security/2016/dsa-3641
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html#AppendixJAVA
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.securityfocus.com/bid/91787
http://www.securityfocus.com/bid/91951
http://www.securitytracker.com/id/1036365
http://www.ubuntu.com/usn/USN-3043-1
http://www.ubuntu.com/usn/USN-3062-1
http://www.ubuntu.com/usn/USN-3077-1
https://access.redhat.com/errata/RHSA-2016:1458
https://access.redhat.com/errata/RHSA-2016:1475
https://access.redhat.com/errata/RHSA-2016:1476
https://access.redhat.com/errata/RHSA-2016:1477
https://access.redhat.com/security/cve/CVE-2016-3550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550
https://linux.oracle.com/cve/CVE-2016-3550.html
https://linux.oracle.com/errata/ELSA-2016-1776.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3550
https://security.gentoo.org/glsa/201610-08
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20160721-0001/
https://ubuntu.com/security/notices/USN-3043-1
https://ubuntu.com/security/notices/USN-3062-1
https://ubuntu.com/security/notices/USN-3077-1
https://www.cve.org/CVERecord?id=CVE-2016-3550
|
| java-1.8.0-openjdk-headless |
CVE-2016-5542 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.111-1.b15.el7_2 |
http://rhn.redhat.com/errata/RHSA-2016-2079.html
http://rhn.redhat.com/errata/RHSA-2016-2088.html
http://rhn.redhat.com/errata/RHSA-2016-2089.html
http://rhn.redhat.com/errata/RHSA-2016-2090.html
http://rhn.redhat.com/errata/RHSA-2016-2136.html
http://rhn.redhat.com/errata/RHSA-2016-2137.html
http://rhn.redhat.com/errata/RHSA-2016-2138.html
http://rhn.redhat.com/errata/RHSA-2016-2658.html
http://rhn.redhat.com/errata/RHSA-2016-2659.html
http://rhn.redhat.com/errata/RHSA-2017-0061.html
http://www.debian.org/security/2016/dsa-3707
http://www.oracle.com/technetwork/java/javase/8u111-relnotes-3124969.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
http://www.securityfocus.com/bid/93643
http://www.securitytracker.com/id/1037040
http://www.ubuntu.com/usn/USN-3130-1
http://www.ubuntu.com/usn/USN-3154-1
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542
https://linux.oracle.com/cve/CVE-2016-5542.html
https://linux.oracle.com/errata/ELSA-2017-0061.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5542
https://security.gentoo.org/glsa/201611-04
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20161019-0001/
https://ubuntu.com/security/notices/USN-3121-1
https://ubuntu.com/security/notices/USN-3130-1
https://ubuntu.com/security/notices/USN-3154-1
https://www.cve.org/CVERecord?id=CVE-2016-5542
|
| java-1.8.0-openjdk-headless |
CVE-2016-5546 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/31dae74ad077
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95506
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5546
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546
https://linux.oracle.com/cve/CVE-2016-5546.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5546
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2016-5546
|
| java-1.8.0-openjdk-headless |
CVE-2016-5547 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/683c9263a5b1
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95521
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5547
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547
https://linux.oracle.com/cve/CVE-2016-5547.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5547
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://www.cve.org/CVERecord?id=CVE-2016-5547
|
| java-1.8.0-openjdk-headless |
CVE-2016-5552 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95512
http://www.securitytracker.com/id/1037637
http://www.securitytracker.com/id/1037798
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5552
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552
https://linux.oracle.com/cve/CVE-2016-5552.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5552
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://source.android.com/security/bulletin/2017-02-01.html
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2016-5552
|
| java-1.8.0-openjdk-headless |
CVE-2016-5554 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.111-1.b15.el7_2 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/588df0398c57
http://rhn.redhat.com/errata/RHSA-2016-2079.html
http://rhn.redhat.com/errata/RHSA-2016-2088.html
http://rhn.redhat.com/errata/RHSA-2016-2089.html
http://rhn.redhat.com/errata/RHSA-2016-2090.html
http://rhn.redhat.com/errata/RHSA-2016-2136.html
http://rhn.redhat.com/errata/RHSA-2016-2137.html
http://rhn.redhat.com/errata/RHSA-2016-2138.html
http://rhn.redhat.com/errata/RHSA-2016-2658.html
http://rhn.redhat.com/errata/RHSA-2016-2659.html
http://rhn.redhat.com/errata/RHSA-2017-0061.html
http://www.debian.org/security/2016/dsa-3707
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
http://www.securityfocus.com/bid/93637
http://www.securitytracker.com/id/1037040
http://www.ubuntu.com/usn/USN-3130-1
http://www.ubuntu.com/usn/USN-3154-1
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554
https://linux.oracle.com/cve/CVE-2016-5554.html
https://linux.oracle.com/errata/ELSA-2017-0061.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5554
https://security.gentoo.org/glsa/201611-04
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20161019-0001/
https://ubuntu.com/security/notices/USN-3121-1
https://ubuntu.com/security/notices/USN-3130-1
https://ubuntu.com/security/notices/USN-3154-1
https://www.cve.org/CVERecord?id=CVE-2016-5554
|
| java-1.8.0-openjdk-headless |
CVE-2016-5597 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.111-1.b15.el7_2 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/d689f7b806c8
http://rhn.redhat.com/errata/RHSA-2016-2079.html
http://rhn.redhat.com/errata/RHSA-2016-2088.html
http://rhn.redhat.com/errata/RHSA-2016-2089.html
http://rhn.redhat.com/errata/RHSA-2016-2090.html
http://rhn.redhat.com/errata/RHSA-2016-2136.html
http://rhn.redhat.com/errata/RHSA-2016-2137.html
http://rhn.redhat.com/errata/RHSA-2016-2138.html
http://rhn.redhat.com/errata/RHSA-2016-2658.html
http://rhn.redhat.com/errata/RHSA-2016-2659.html
http://rhn.redhat.com/errata/RHSA-2017-0061.html
http://www.debian.org/security/2016/dsa-3707
http://www.oracle.com/technetwork/java/javase/8u111-relnotes-3124969.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
http://www.securityfocus.com/bid/93636
http://www.securitytracker.com/id/1037040
http://www.ubuntu.com/usn/USN-3130-1
http://www.ubuntu.com/usn/USN-3154-1
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2016-5597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597
https://linux.oracle.com/cve/CVE-2016-5597.html
https://linux.oracle.com/errata/ELSA-2017-0061.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5597
https://security.gentoo.org/glsa/201611-04
https://security.gentoo.org/glsa/201701-43
https://security.netapp.com/advisory/ntap-20161019-0001/
https://ubuntu.com/security/notices/USN-3121-1
https://ubuntu.com/security/notices/USN-3130-1
https://ubuntu.com/security/notices/USN-3154-1
https://www.cve.org/CVERecord?id=CVE-2016-5597
|
| java-1.8.0-openjdk-headless |
CVE-2017-10081 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99853
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/security/cve/CVE-2017-10081
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081
https://linux.oracle.com/cve/CVE-2017-10081.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10081
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10081
|
| java-1.8.0-openjdk-headless |
CVE-2017-10108 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99846
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10108
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108
https://linux.oracle.com/cve/CVE-2017-10108.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10108
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10108
|
| java-1.8.0-openjdk-headless |
CVE-2017-10109 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99847
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10109
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109
https://linux.oracle.com/cve/CVE-2017-10109.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10109
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10109
|
| java-1.8.0-openjdk-headless |
CVE-2017-10115 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99774
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10115
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115
https://linux.oracle.com/cve/CVE-2017-10115.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10115
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10115
|
| java-1.8.0-openjdk-headless |
CVE-2017-10118 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
|
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99782
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/security/cve/CVE-2017-10118
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10118
https://nvd.nist.gov/vuln/detail/CVE-2017-10118
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10118
|
| java-1.8.0-openjdk-headless |
CVE-2017-10176 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
|
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99788
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/security/cve/CVE-2017-10176
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10176
https://nvd.nist.gov/vuln/detail/CVE-2017-10176
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10176
|
| java-1.8.0-openjdk-headless |
CVE-2017-10198 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99818
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/security/cve/CVE-2017-10198
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198
https://linux.oracle.com/cve/CVE-2017-10198.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10198
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://www.cve.org/CVERecord?id=CVE-2017-10198
|
| java-1.8.0-openjdk-headless |
CVE-2017-10243 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99827
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10243
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243
https://linux.oracle.com/cve/CVE-2017-10243.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10243
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10243
|
| java-1.8.0-openjdk-headless |
CVE-2017-10281 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101378
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281
https://linux.oracle.com/cve/CVE-2017-10281.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10281
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10281
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk-headless |
CVE-2017-10295 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101384
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10295
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295
https://linux.oracle.com/cve/CVE-2017-10295.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10295
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10295
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk-headless |
CVE-2017-10347 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101382
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347
https://linux.oracle.com/cve/CVE-2017-10347.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10347
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10347
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk-headless |
CVE-2017-10348 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101354
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348
https://linux.oracle.com/cve/CVE-2017-10348.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10348
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10348
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk-headless |
CVE-2017-10349 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101348
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349
https://linux.oracle.com/cve/CVE-2017-10349.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10349
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10349
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk-headless |
CVE-2017-10350 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101341
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350
https://linux.oracle.com/cve/CVE-2017-10350.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10350
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10350
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk-headless |
CVE-2017-10355 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/java/javase/8u151-relnotes-3850493.html
http://www.oracle.com/technetwork/java/javase/documentation/overview-156328.html#R160_171
http://www.oracle.com/technetwork/java/javaseproducts/documentation/javase7supportreleasenotes-1601161.html#R170_161
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/101369
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10355
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355
https://linux.oracle.com/cve/CVE-2017-10355.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10355
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10355
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk-headless |
CVE-2017-10356 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101413
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10356
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356
https://linux.oracle.com/cve/CVE-2017-10356.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10356
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10356
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk-headless |
CVE-2017-10357 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101355
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10357
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357
https://linux.oracle.com/cve/CVE-2017-10357.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10357
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10357
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk-headless |
CVE-2017-3231 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/dfa1648415a4
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95563
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231
https://linux.oracle.com/cve/CVE-2017-3231.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3231
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2017-3231
|
| java-1.8.0-openjdk-headless |
CVE-2017-3252 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/6cb0106507eb
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95509
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252
https://linux.oracle.com/cve/CVE-2017-3252.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3252
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2017-3252
|
| java-1.8.0-openjdk-headless |
CVE-2017-3253 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/b59238f0e161
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95498
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253
https://linux.oracle.com/cve/CVE-2017-3253.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3253
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2017-3253
|
| java-1.8.0-openjdk-headless |
CVE-2017-3261 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.121-0.b13.el7_3 |
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/876a505a9f20
http://rhn.redhat.com/errata/RHSA-2017-0175.html
http://rhn.redhat.com/errata/RHSA-2017-0176.html
http://rhn.redhat.com/errata/RHSA-2017-0177.html
http://rhn.redhat.com/errata/RHSA-2017-0180.html
http://rhn.redhat.com/errata/RHSA-2017-0263.html
http://rhn.redhat.com/errata/RHSA-2017-0269.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://www.debian.org/security/2017/dsa-3782
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3432537.xml
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html
http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html#AppendixJAVA
http://www.securityfocus.com/bid/95566
http://www.securitytracker.com/id/1037637
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/security/cve/CVE-2017-3261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261
https://linux.oracle.com/cve/CVE-2017-3261.html
https://linux.oracle.com/errata/ELSA-2017-0269.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3261
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20170119-0001/
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://www.cve.org/CVERecord?id=CVE-2017-3261
|
| java-1.8.0-openjdk-headless |
CVE-2017-3509 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.131-2.b11.el7_3 |
http://www.debian.org/security/2017/dsa-3858
http://www.oracle.com/technetwork/java/javase/8u131-relnotes-3565278.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixJAVA
http://www.securityfocus.com/bid/97737
http://www.securitytracker.com/id/1038286
https://access.redhat.com/errata/RHSA-2017:1108
https://access.redhat.com/errata/RHSA-2017:1109
https://access.redhat.com/errata/RHSA-2017:1117
https://access.redhat.com/errata/RHSA-2017:1118
https://access.redhat.com/errata/RHSA-2017:1119
https://access.redhat.com/errata/RHSA-2017:1204
https://access.redhat.com/errata/RHSA-2017:1220
https://access.redhat.com/errata/RHSA-2017:1221
https://access.redhat.com/errata/RHSA-2017:1222
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-3509
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509
https://linux.oracle.com/cve/CVE-2017-3509.html
https://linux.oracle.com/errata/ELSA-2017-1204.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3509
https://security-tracker.debian.org/tracker/CVE-2017-3509
https://security.gentoo.org/glsa/201705-03
https://security.gentoo.org/glsa/201707-01
https://ubuntu.com/security/notices/USN-3275-1
https://ubuntu.com/security/notices/USN-3275-2
https://www.cve.org/CVERecord?id=CVE-2017-3509
|
| java-1.8.0-openjdk-headless |
CVE-2017-3511 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.131-2.b11.el7_3 |
http://www.debian.org/security/2017/dsa-3858
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixJAVA
http://www.securityfocus.com/bid/97731
http://www.securitytracker.com/id/1038286
https://access.redhat.com/errata/RHSA-2017:1108
https://access.redhat.com/errata/RHSA-2017:1109
https://access.redhat.com/errata/RHSA-2017:1117
https://access.redhat.com/errata/RHSA-2017:1118
https://access.redhat.com/errata/RHSA-2017:1204
https://access.redhat.com/errata/RHSA-2017:1220
https://access.redhat.com/errata/RHSA-2017:1221
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-3511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511
https://linux.oracle.com/cve/CVE-2017-3511.html
https://linux.oracle.com/errata/ELSA-2017-1204.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3511
https://security.gentoo.org/glsa/201705-03
https://security.gentoo.org/glsa/201707-01
https://ubuntu.com/security/notices/USN-3275-1
https://ubuntu.com/security/notices/USN-3275-2
https://www.cve.org/CVERecord?id=CVE-2017-3511
|
| java-1.8.0-openjdk-headless |
CVE-2017-3526 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.131-2.b11.el7_3 |
http://www.debian.org/security/2017/dsa-3858
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixJAVA
http://www.securityfocus.com/bid/97733
http://www.securitytracker.com/id/1038286
https://access.redhat.com/errata/RHSA-2017:1108
https://access.redhat.com/errata/RHSA-2017:1109
https://access.redhat.com/errata/RHSA-2017:1117
https://access.redhat.com/errata/RHSA-2017:1118
https://access.redhat.com/errata/RHSA-2017:1119
https://access.redhat.com/errata/RHSA-2017:1204
https://access.redhat.com/security/cve/CVE-2017-3526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526
https://linux.oracle.com/cve/CVE-2017-3526.html
https://linux.oracle.com/errata/ELSA-2017-1204.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3526
https://security.gentoo.org/glsa/201705-03
https://security.gentoo.org/glsa/201707-01
https://ubuntu.com/security/notices/USN-3275-1
https://ubuntu.com/security/notices/USN-3275-2
https://www.cve.org/CVERecord?id=CVE-2017-3526
|
| java-1.8.0-openjdk-headless |
CVE-2017-3539 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.131-2.b11.el7_3 |
http://www.debian.org/security/2017/dsa-3858
http://www.oracle.com/technetwork/java/javase/8u131-relnotes-3565278.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixJAVA
http://www.securityfocus.com/bid/97752
http://www.securitytracker.com/id/1038286
https://access.redhat.com/errata/RHSA-2017:1108
https://access.redhat.com/errata/RHSA-2017:1109
https://access.redhat.com/errata/RHSA-2017:1117
https://access.redhat.com/errata/RHSA-2017:1118
https://access.redhat.com/errata/RHSA-2017:1119
https://access.redhat.com/errata/RHSA-2017:1204
https://access.redhat.com/errata/RHSA-2017:1220
https://access.redhat.com/errata/RHSA-2017:1221
https://access.redhat.com/errata/RHSA-2017:1222
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-3539
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539
https://linux.oracle.com/cve/CVE-2017-3539.html
https://linux.oracle.com/errata/ELSA-2017-1204.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3539
https://security.gentoo.org/glsa/201705-03
https://security.gentoo.org/glsa/201707-01
https://ubuntu.com/security/notices/USN-3275-1
https://ubuntu.com/security/notices/USN-3275-2
https://www.cve.org/CVERecord?id=CVE-2017-3539
https://www.java.com/en/jre-jdk-cryptoroadmap.html
|
| java-1.8.0-openjdk-headless |
CVE-2018-2588 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102661
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2588.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2588
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2588
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2599 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102633
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2599.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2599
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2599
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2602 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102642
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2602.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2602
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2602
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2603 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102625
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2603.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2603
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2603
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2618 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/java/javase/8u161-relnotes-4021379.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102612
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2618.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2618
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2618
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2629 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102615
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2629
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2629.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2629
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2629
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2663 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102662
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2663.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2663
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2663
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2677 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102656
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2677
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2677.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2677
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2677
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2678 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102659
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2678
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2678.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2678
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2678
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2795 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103847
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2795.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2795
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2795
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk-headless |
CVE-2018-2796 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103868
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2796.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2796
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2796
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk-headless |
CVE-2018-2797 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103846
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2797.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2797
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2797
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk-headless |
CVE-2018-2798 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103841
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2798
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2798.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2798
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2798
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk-headless |
CVE-2018-2799 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103872
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2799
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2799.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E
https://lists.apache.org/thread.html/b53d4601ecd9ec63c799dbe1bc5b78e0d52f4cef429da2dfe63cf06d%40%3Cfop-dev.xmlgraphics.apache.org%3E
https://lists.apache.org/thread.html/r449b5d89c7b2ba3762584cf6c38e01867d4b24706e023cf2a9911307%40%3Cuser.spark.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-2799
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2799
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk-headless |
CVE-2018-2800 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103849
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2800.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2800
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2800
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk-headless |
CVE-2018-2815 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103848
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/security/cve/CVE-2018-2815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2815.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2815
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2815
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk-headless |
CVE-2018-2952 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.181-3.b13.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/104765
http://www.securitytracker.com/id/1041302
https://access.redhat.com/errata/RHSA-2018:2241
https://access.redhat.com/errata/RHSA-2018:2242
https://access.redhat.com/errata/RHSA-2018:2253
https://access.redhat.com/errata/RHSA-2018:2254
https://access.redhat.com/errata/RHSA-2018:2255
https://access.redhat.com/errata/RHSA-2018:2256
https://access.redhat.com/errata/RHSA-2018:2283
https://access.redhat.com/errata/RHSA-2018:2286
https://access.redhat.com/errata/RHSA-2018:2568
https://access.redhat.com/errata/RHSA-2018:2569
https://access.redhat.com/errata/RHSA-2018:2575
https://access.redhat.com/errata/RHSA-2018:2576
https://access.redhat.com/errata/RHSA-2018:2712
https://access.redhat.com/errata/RHSA-2018:2713
https://access.redhat.com/errata/RHSA-2018:3007
https://access.redhat.com/errata/RHSA-2018:3008
https://access.redhat.com/security/cve/CVE-2018-2952
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2952
https://linux.oracle.com/cve/CVE-2018-2952.html
https://linux.oracle.com/errata/ELSA-2018-2286.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2952
https://security.netapp.com/advisory/ntap-20180726-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03882en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03928en_us
https://ubuntu.com/security/notices/USN-3734-1
https://ubuntu.com/security/notices/USN-3735-1
https://ubuntu.com/security/notices/USN-3747-1
https://usn.ubuntu.com/3734-1/
https://usn.ubuntu.com/3735-1/
https://usn.ubuntu.com/3747-1/
https://www.cve.org/CVERecord?id=CVE-2018-2952
https://www.debian.org/security/2018/dsa-4268
|
| java-1.8.0-openjdk-headless |
CVE-2018-3136 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105601
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3000
https://access.redhat.com/errata/RHSA-2018:3001
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3007
https://access.redhat.com/errata/RHSA-2018:3008
https://access.redhat.com/errata/RHSA-2018:3350
https://access.redhat.com/errata/RHSA-2018:3409
https://access.redhat.com/errata/RHSA-2018:3521
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3671
https://access.redhat.com/errata/RHSA-2018:3672
https://access.redhat.com/errata/RHSA-2018:3779
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3136
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136
https://linux.oracle.com/cve/CVE-2018-3136.html
https://linux.oracle.com/errata/ELSA-2018-3521.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3136
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://ubuntu.com/security/notices/USN-3824-1
https://usn.ubuntu.com/3804-1/
https://usn.ubuntu.com/3824-1/
https://www.cve.org/CVERecord?id=CVE-2018-3136
https://www.debian.org/security/2018/dsa-4326
|
| java-1.8.0-openjdk-headless |
CVE-2018-3139 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105602
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3000
https://access.redhat.com/errata/RHSA-2018:3001
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3007
https://access.redhat.com/errata/RHSA-2018:3008
https://access.redhat.com/errata/RHSA-2018:3350
https://access.redhat.com/errata/RHSA-2018:3409
https://access.redhat.com/errata/RHSA-2018:3521
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3671
https://access.redhat.com/errata/RHSA-2018:3672
https://access.redhat.com/errata/RHSA-2018:3779
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139
https://linux.oracle.com/cve/CVE-2018-3139.html
https://linux.oracle.com/errata/ELSA-2018-3521.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3139
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://ubuntu.com/security/notices/USN-3824-1
https://usn.ubuntu.com/3804-1/
https://usn.ubuntu.com/3824-1/
https://www.cve.org/CVERecord?id=CVE-2018-3139
https://www.debian.org/security/2018/dsa-4326
https://www.oracle.com/technetwork/java/javase/11-0-1-relnotes-5032023.html
|
| java-1.8.0-openjdk-headless |
CVE-2018-3180 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105617
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3000
https://access.redhat.com/errata/RHSA-2018:3001
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3007
https://access.redhat.com/errata/RHSA-2018:3008
https://access.redhat.com/errata/RHSA-2018:3350
https://access.redhat.com/errata/RHSA-2018:3409
https://access.redhat.com/errata/RHSA-2018:3521
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3671
https://access.redhat.com/errata/RHSA-2018:3672
https://access.redhat.com/errata/RHSA-2018:3779
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3180
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180
https://linux.oracle.com/cve/CVE-2018-3180.html
https://linux.oracle.com/errata/ELSA-2018-3521.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3180
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://ubuntu.com/security/notices/USN-3824-1
https://usn.ubuntu.com/3804-1/
https://usn.ubuntu.com/3824-1/
https://www.cve.org/CVERecord?id=CVE-2018-3180
https://www.debian.org/security/2018/dsa-4326
|
| java-1.8.0-openjdk-headless |
CVE-2018-3214 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.191.b12-0.el7_5 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/105615
http://www.securitytracker.com/id/1041889
https://access.redhat.com/errata/RHSA-2018:2942
https://access.redhat.com/errata/RHSA-2018:2943
https://access.redhat.com/errata/RHSA-2018:3000
https://access.redhat.com/errata/RHSA-2018:3001
https://access.redhat.com/errata/RHSA-2018:3002
https://access.redhat.com/errata/RHSA-2018:3003
https://access.redhat.com/errata/RHSA-2018:3007
https://access.redhat.com/errata/RHSA-2018:3008
https://access.redhat.com/errata/RHSA-2018:3350
https://access.redhat.com/errata/RHSA-2018:3409
https://access.redhat.com/errata/RHSA-2018:3533
https://access.redhat.com/errata/RHSA-2018:3534
https://access.redhat.com/errata/RHSA-2018:3671
https://access.redhat.com/errata/RHSA-2018:3672
https://access.redhat.com/errata/RHSA-2018:3779
https://access.redhat.com/errata/RHSA-2018:3852
https://access.redhat.com/security/cve/CVE-2018-3214
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214
https://linux.oracle.com/cve/CVE-2018-3214.html
https://linux.oracle.com/errata/ELSA-2018-3409.html
https://lists.debian.org/debian-lts-announce/2018/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-3214
https://security.gentoo.org/glsa/201908-10
https://security.netapp.com/advisory/ntap-20181018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03952en_us
https://ubuntu.com/security/notices/USN-3804-1
https://usn.ubuntu.com/3804-1/
https://www.cve.org/CVERecord?id=CVE-2018-3214
https://www.debian.org/security/2018/dsa-4326
|
| java-1.8.0-openjdk-headless |
CVE-2019-2422 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.201.b09-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
http://www.securityfocus.com/bid/106596
https://access.redhat.com/errata/RHSA-2019:0416
https://access.redhat.com/errata/RHSA-2019:0435
https://access.redhat.com/errata/RHSA-2019:0436
https://access.redhat.com/errata/RHSA-2019:0462
https://access.redhat.com/errata/RHSA-2019:0464
https://access.redhat.com/errata/RHSA-2019:0469
https://access.redhat.com/errata/RHSA-2019:0472
https://access.redhat.com/errata/RHSA-2019:0473
https://access.redhat.com/errata/RHSA-2019:0474
https://access.redhat.com/errata/RHSA-2019:0640
https://access.redhat.com/errata/RHSA-2019:1238
https://access.redhat.com/security/cve/CVE-2019-2422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2422
https://linux.oracle.com/cve/CVE-2019-2422.html
https://linux.oracle.com/errata/ELSA-2019-0464.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2422
https://seclists.org/bugtraq/2019/Mar/27
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20190118-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03958en_us
https://ubuntu.com/security/notices/USN-3875-1
https://ubuntu.com/security/notices/USN-3942-1
https://ubuntu.com/security/notices/USN-3949-1
https://usn.ubuntu.com/3875-1/
https://usn.ubuntu.com/3942-1/
https://usn.ubuntu.com/3949-1/
https://www.cve.org/CVERecord?id=CVE-2019-2422
https://www.debian.org/security/2019/dsa-4410
|
| java-1.8.0-openjdk-headless |
CVE-2019-2602 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.212.b04-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://access.redhat.com/errata/RHBA-2019:0959
https://access.redhat.com/errata/RHSA-2019:1146
https://access.redhat.com/errata/RHSA-2019:1163
https://access.redhat.com/errata/RHSA-2019:1164
https://access.redhat.com/errata/RHSA-2019:1165
https://access.redhat.com/errata/RHSA-2019:1166
https://access.redhat.com/errata/RHSA-2019:1238
https://access.redhat.com/errata/RHSA-2019:1325
https://access.redhat.com/errata/RHSA-2019:1518
https://access.redhat.com/security/cve/CVE-2019-2602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2602
https://kc.mcafee.com/corporate/index?page=content&id=SB10285
https://linux.oracle.com/cve/CVE-2019-2602.html
https://linux.oracle.com/errata/ELSA-2019-1518.html
https://lists.debian.org/debian-lts-announce/2019/05/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2602
https://seclists.org/bugtraq/2019/May/75
https://security.gentoo.org/glsa/201908-10
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us
https://ubuntu.com/security/notices/USN-3975-1
https://usn.ubuntu.com/3975-1/
https://www.cve.org/CVERecord?id=CVE-2019-2602
https://www.debian.org/security/2019/dsa-4453
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixJAVA
|
| java-1.8.0-openjdk-headless |
CVE-2019-2684 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.212.b04-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
http://www.openwall.com/lists/oss-security/2020/09/01/4
http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://access.redhat.com/errata/RHBA-2019:0959
https://access.redhat.com/errata/RHSA-2019:1146
https://access.redhat.com/errata/RHSA-2019:1163
https://access.redhat.com/errata/RHSA-2019:1164
https://access.redhat.com/errata/RHSA-2019:1165
https://access.redhat.com/errata/RHSA-2019:1166
https://access.redhat.com/errata/RHSA-2019:1238
https://access.redhat.com/errata/RHSA-2019:1325
https://access.redhat.com/errata/RHSA-2019:1518
https://access.redhat.com/security/cve/CVE-2019-2684
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2684
https://linux.oracle.com/cve/CVE-2019-2684.html
https://linux.oracle.com/errata/ELSA-2019-1518.html
https://lists.apache.org/thread.html/38a01302c92ae513910d8c851a2d111736565bd698be4e3af3e4c063%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/71bd3e4e222479c266eaafc8d0c171ef5782a69b52f68df11b650ed7%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c58d6c3b49c615916b163809f963a55421cac2264885739508e68108%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/f7f54b4888060d99f59993f006e25005a2b58db0c07ff866bdcd6f17%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1fd117082b992e7d43c1286e966c285f98aa362e685695d999ff42f7%40%3Cuser.cassandra.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r718e01f61b35409a4f7a3ccbc1cb5136a1558a9f9c2cb8d4ca9be1ce%40%3Cuser.cassandra.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rab8d90d28f944d84e4d7852f355a25c89451ae02c2decc4d355a9cfc%40%3Cuser.cassandra.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rcd7544b24d8fc32b7950ec4c117052410b661babaa857fb1fc641152%40%3Cdev.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rcd7544b24d8fc32b7950ec4c117052410b661babaa857fb1fc641152%40%3Cuser.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/05/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2684
https://seclists.org/bugtraq/2019/May/75
https://security.gentoo.org/glsa/201908-10
https://support.f5.com/csp/article/K11175903?utm_source=f5support&%3Butm_medium=RSS
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us
https://ubuntu.com/security/notices/USN-3975-1
https://usn.ubuntu.com/3975-1/
https://www.cve.org/CVERecord?id=CVE-2019-2684
https://www.debian.org/security/2019/dsa-4453
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html#AppendixJAVA
|
| java-1.8.0-openjdk-headless |
CVE-2019-2745 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.222.b10-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://access.redhat.com/security/cve/CVE-2019-2745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745
https://kc.mcafee.com/corporate/index?page=content&id=SB10300
https://linux.oracle.com/cve/CVE-2019-2745.html
https://linux.oracle.com/errata/ELSA-2019-1840.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2745
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
https://ubuntu.com/security/notices/USN-4080-1
https://usn.ubuntu.com/4080-1/
https://www.cve.org/CVERecord?id=CVE-2019-2745
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| java-1.8.0-openjdk-headless |
CVE-2019-2762 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.222.b10-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://access.redhat.com/errata/RHSA-2019:2494
https://access.redhat.com/errata/RHSA-2019:2495
https://access.redhat.com/errata/RHSA-2019:2585
https://access.redhat.com/errata/RHSA-2019:2590
https://access.redhat.com/errata/RHSA-2019:2592
https://access.redhat.com/errata/RHSA-2019:2737
https://access.redhat.com/security/cve/CVE-2019-2762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762
https://kc.mcafee.com/corporate/index?page=content&id=SB10300
https://linux.oracle.com/cve/CVE-2019-2762.html
https://linux.oracle.com/errata/ELSA-2019-1840.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2762
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
https://ubuntu.com/security/notices/USN-4080-1
https://ubuntu.com/security/notices/USN-4083-1
https://usn.ubuntu.com/4080-1/
https://usn.ubuntu.com/4083-1/
https://www.cve.org/CVERecord?id=CVE-2019-2762
https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/5572395.xml
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| java-1.8.0-openjdk-headless |
CVE-2019-2769 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.222.b10-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://access.redhat.com/errata/RHSA-2019:2494
https://access.redhat.com/errata/RHSA-2019:2495
https://access.redhat.com/errata/RHSA-2019:2585
https://access.redhat.com/errata/RHSA-2019:2590
https://access.redhat.com/errata/RHSA-2019:2592
https://access.redhat.com/errata/RHSA-2019:2737
https://access.redhat.com/security/cve/CVE-2019-2769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769
https://kc.mcafee.com/corporate/index?page=content&id=SB10300
https://linux.oracle.com/cve/CVE-2019-2769.html
https://linux.oracle.com/errata/ELSA-2019-1840.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2769
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
https://ubuntu.com/security/notices/USN-4080-1
https://ubuntu.com/security/notices/USN-4083-1
https://usn.ubuntu.com/4080-1/
https://usn.ubuntu.com/4083-1/
https://www.cve.org/CVERecord?id=CVE-2019-2769
|
| java-1.8.0-openjdk-headless |
CVE-2019-2816 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.222.b10-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://access.redhat.com/errata/RHSA-2019:2494
https://access.redhat.com/errata/RHSA-2019:2495
https://access.redhat.com/errata/RHSA-2019:2585
https://access.redhat.com/errata/RHSA-2019:2590
https://access.redhat.com/errata/RHSA-2019:2592
https://access.redhat.com/errata/RHSA-2019:2737
https://access.redhat.com/security/cve/CVE-2019-2816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816
https://kc.mcafee.com/corporate/index?page=content&id=SB10300
https://linux.oracle.com/cve/CVE-2019-2816.html
https://linux.oracle.com/errata/ELSA-2019-1840.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2816
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
https://ubuntu.com/security/notices/USN-4080-1
https://ubuntu.com/security/notices/USN-4083-1
https://usn.ubuntu.com/4080-1/
https://usn.ubuntu.com/4083-1/
https://www.cve.org/CVERecord?id=CVE-2019-2816
https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/5572395.xml
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| java-1.8.0-openjdk-headless |
CVE-2019-2842 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.222.b10-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://access.redhat.com/security/cve/CVE-2019-2842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842
https://kc.mcafee.com/corporate/index?page=content&id=SB10300
https://linux.oracle.com/cve/CVE-2019-2842.html
https://linux.oracle.com/errata/ELSA-2019-1840.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2842
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
https://ubuntu.com/security/notices/USN-4080-1
https://usn.ubuntu.com/4080-1/
https://www.cve.org/CVERecord?id=CVE-2019-2842
https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/5572395.xml
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| java-1.8.0-openjdk-headless |
CVE-2019-2975 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2975
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2019-2975.html
https://linux.oracle.com/errata/ELSA-2019-3136.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2975
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2975
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk-headless |
CVE-2019-2978 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2978
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2978
https://linux.oracle.com/cve/CVE-2019-2978.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2978
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2978
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk-headless |
CVE-2019-2989 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2989
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2989
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2019-2989.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2989
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2989
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk-headless |
CVE-2020-14556 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14556
https://linux.oracle.com/cve/CVE-2020-14556.html
https://linux.oracle.com/errata/ELSA-2020-2985.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
https://nvd.nist.gov/vuln/detail/CVE-2020-14556
https://security.gentoo.org/glsa/202008-24
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4433-1
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4433-1/
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14556
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-14578 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14578
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-14578.html
https://linux.oracle.com/errata/ELSA-2020-2985.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://nvd.nist.gov/vuln/detail/CVE-2020-14578
https://security.gentoo.org/glsa/202008-24
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14578
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-14579 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14579
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-14579.html
https://linux.oracle.com/errata/ELSA-2020-2985.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://nvd.nist.gov/vuln/detail/CVE-2020-14579
https://security.gentoo.org/glsa/202008-24
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14579
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-14621 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14621
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-14621.html
https://linux.oracle.com/errata/ELSA-2020-2985.html
https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103%40%3Cj-users.xerces.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
https://nvd.nist.gov/vuln/detail/CVE-2020-14621
https://security.gentoo.org/glsa/202008-24
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4433-1
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4433-1/
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14621
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-14781 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14781
https://linux.oracle.com/cve/CVE-2020-14781.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14781
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14781
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-14782 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14782
https://linux.oracle.com/cve/CVE-2020-14782.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14782
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14782
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-14792 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14792
https://linux.oracle.com/cve/CVE-2020-14792.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14792
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14792
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-14797 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14797
https://linux.oracle.com/cve/CVE-2020-14797.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14797
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14797
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-14803 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14803
https://linux.oracle.com/cve/CVE-2020-14803.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14803
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14803
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2590 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0157
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0232
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2590
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2590
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2020-2590.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2590
https://seclists.org/bugtraq/2020/Feb/22
https://seclists.org/bugtraq/2020/Jan/24
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2590
https://www.debian.org/security/2020/dsa-4605
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2593 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0157
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0232
https://access.redhat.com/errata/RHSA-2020:0465
https://access.redhat.com/errata/RHSA-2020:0467
https://access.redhat.com/errata/RHSA-2020:0468
https://access.redhat.com/errata/RHSA-2020:0469
https://access.redhat.com/errata/RHSA-2020:0470
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2593
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2020-2593.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2593
https://seclists.org/bugtraq/2020/Feb/22
https://seclists.org/bugtraq/2020/Jan/24
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2593
https://www.debian.org/security/2020/dsa-4605
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2654 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0157
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0232
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2654
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2020-2654.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2654
https://seclists.org/bugtraq/2020/Feb/22
https://seclists.org/bugtraq/2020/Jan/24
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2654
https://www.debian.org/security/2020/dsa-4605
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2773 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2773
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-2773.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2773
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2773
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2781 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2781
https://kc.mcafee.com/corporate/index?page=content&id=SB10318
https://linux.oracle.com/cve/CVE-2020-2781.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2781
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2781
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2800 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2800
https://linux.oracle.com/cve/CVE-2020-2800.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2800
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2800
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2830 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2830
https://kc.mcafee.com/corporate/index?page=content&id=SB10318
https://linux.oracle.com/cve/CVE-2020-2830.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2830
https://security.gentoo.org/glsa/202006-22
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2830
https://www.debian.org/security/2020/dsa-4662
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-2163 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.292.b10-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-2163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163
https://linux.oracle.com/cve/CVE-2021-2163.html
https://linux.oracle.com/errata/ELSA-2021-1307.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5ACX4JEVYH6H4PSMGMYWTGABPOFPH3TS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CFXOKM2233JVGYDOWW77BN54X3GZTIBK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CG7EWXSO6JUCVHP7R3SOZQ7WPNBOISJH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAULPCQFLAMBJIS27YLNNX6IHRFJMVP4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MVDY4T5XMSYDQT6RRKPMRCV4MVGS7KXF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD3JEP4HPLK7MNZHVUMKIJPBP74M3A2V/
https://nvd.nist.gov/vuln/detail/CVE-2021-2163
https://rhn.redhat.com/errata/RHSA-2021-1301.html
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20210513-0001/
https://ubuntu.com/security/notices/USN-4892-1
https://www.cve.org/CVERecord?id=CVE-2021-2163
https://www.debian.org/security/2021/dsa-4899
https://www.oracle.com/security-alerts/cpuapr2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-2341 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.302.b08-0.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json
https://access.redhat.com/security/cve/CVE-2021-2341
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341
https://linux.oracle.com/cve/CVE-2021-2341.html
https://linux.oracle.com/errata/ELSA-2021-2845.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A4TTUHVQF2MGUTP6GTCXLZS4GXK3XUWC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N57OFX5EJKHHDW4WAOBZFWA5CL4VIIK5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJJ75FHSUZGWPV4UJTSMQHWLOQ77LHTG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VTRQIXB52KIXUAO6JBYUKYWXST2NKNAK/
https://nvd.nist.gov/vuln/detail/CVE-2021-2341
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20210723-0002/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-2341
https://www.debian.org/security/2021/dsa-4946
https://www.oracle.com/java/technologies/javase/11-0-12-relnotes.html
https://www.oracle.com/java/technologies/javase/8u301-relnotes.html
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-2369 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.302.b08-0.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2369.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2388.json
https://access.redhat.com/security/cve/CVE-2021-2369
https://bugzilla.redhat.com/show_bug.cgi?id=1982879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369
https://linux.oracle.com/cve/CVE-2021-2369.html
https://linux.oracle.com/errata/ELSA-2021-2845.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2021-2369
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20210723-0002/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-2369
https://www.debian.org/security/2021/dsa-4946
https://www.oracle.com/security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-35550 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35550
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550
https://linux.oracle.com/cve/CVE-2021-35550.html
https://linux.oracle.com/errata/ELSA-2021-3893.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
https://nvd.nist.gov/vuln/detail/CVE-2021-35550
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35550
https://www.debian.org/security/2021/dsa-5000
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-35556 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556
https://linux.oracle.com/cve/CVE-2021-35556.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
https://nvd.nist.gov/vuln/detail/CVE-2021-35556
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35556
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-35559 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559
https://linux.oracle.com/cve/CVE-2021-35559.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
https://nvd.nist.gov/vuln/detail/CVE-2021-35559
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35559
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-35561 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35561
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561
https://linux.oracle.com/cve/CVE-2021-35561.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
https://nvd.nist.gov/vuln/detail/CVE-2021-35561
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35561
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-35564 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35564
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564
https://linux.oracle.com/cve/CVE-2021-35564.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
https://nvd.nist.gov/vuln/detail/CVE-2021-35564
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35564
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-35578 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35578
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578
https://linux.oracle.com/cve/CVE-2021-35578.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://nvd.nist.gov/vuln/detail/CVE-2021-35578
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35578
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-35586 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586
https://linux.oracle.com/cve/CVE-2021-35586.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://nvd.nist.gov/vuln/detail/CVE-2021-35586
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35586
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21248 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21248
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248
https://linux.oracle.com/cve/CVE-2022-21248.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
https://nvd.nist.gov/vuln/detail/CVE-2022-21248
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21248
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21282 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282
https://linux.oracle.com/cve/CVE-2022-21282.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21282
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21282
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21283 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283
https://linux.oracle.com/cve/CVE-2022-21283.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
https://nvd.nist.gov/vuln/detail/CVE-2022-21283
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21283
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21293 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21293
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293
https://linux.oracle.com/cve/CVE-2022-21293.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
https://nvd.nist.gov/vuln/detail/CVE-2022-21293
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21293
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21294 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21294
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294
https://linux.oracle.com/cve/CVE-2022-21294.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21294
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21294
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21296 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21296
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296
https://linux.oracle.com/cve/CVE-2022-21296.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21296
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21296
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21299 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21299
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299
https://linux.oracle.com/cve/CVE-2022-21299.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21299
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21299
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21305 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305
https://linux.oracle.com/cve/CVE-2022-21305.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21305
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21305
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21340 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21340
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340
https://linux.oracle.com/cve/CVE-2022-21340.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21340
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21340
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21341 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21341
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341
https://linux.oracle.com/cve/CVE-2022-21341.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21341
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21341
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21360 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360
https://linux.oracle.com/cve/CVE-2022-21360.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21360
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21360
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21365 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.322.b06-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21248.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21277.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21282.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21283.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21291.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21293.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21294.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21296.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21299.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21305.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21340.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21341.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21360.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21365.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21366.json
https://access.redhat.com/security/cve/CVE-2022-21365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365
https://linux.oracle.com/cve/CVE-2022-21365.html
https://linux.oracle.com/errata/ELSA-2022-0307.html
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21365
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20220121-0007/
https://ubuntu.com/security/notices/USN-5313-1
https://ubuntu.com/security/notices/USN-5313-2
https://www.cve.org/CVERecord?id=CVE-2022-21365
https://www.debian.org/security/2022/dsa-5057
https://www.debian.org/security/2022/dsa-5058
https://www.oracle.com/security-alerts/cpujan2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21426 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.332.b09-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
https://access.redhat.com/security/cve/CVE-2022-21426
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426
https://errata.almalinux.org/8/ALSA-2022-1491.html
https://linux.oracle.com/cve/CVE-2022-21426.html
https://linux.oracle.com/errata/ELSA-2022-2137.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21426
https://security.netapp.com/advisory/ntap-20220429-0006/
https://ubuntu.com/security/notices/USN-5388-1
https://ubuntu.com/security/notices/USN-5388-2
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21426
https://www.debian.org/security/2022/dsa-5128
https://www.debian.org/security/2022/dsa-5131
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21434 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.332.b09-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
https://access.redhat.com/security/cve/CVE-2022-21434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434
https://errata.almalinux.org/8/ALSA-2022-1491.html
https://linux.oracle.com/cve/CVE-2022-21434.html
https://linux.oracle.com/errata/ELSA-2022-2137.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21434
https://security.netapp.com/advisory/ntap-20220429-0006/
https://ubuntu.com/security/notices/USN-5388-1
https://ubuntu.com/security/notices/USN-5388-2
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21434
https://www.debian.org/security/2022/dsa-5128
https://www.debian.org/security/2022/dsa-5131
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21443 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.332.b09-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
https://access.redhat.com/security/cve/CVE-2022-21443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443
https://errata.almalinux.org/8/ALSA-2022-1491.html
https://linux.oracle.com/cve/CVE-2022-21443.html
https://linux.oracle.com/errata/ELSA-2022-2137.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21443
https://security.netapp.com/advisory/ntap-20220429-0006/
https://ubuntu.com/security/notices/USN-5388-1
https://ubuntu.com/security/notices/USN-5388-2
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21443
https://www.debian.org/security/2022/dsa-5128
https://www.debian.org/security/2022/dsa-5131
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21496 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.332.b09-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21426.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21434.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21443.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21476.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21496.json
https://access.redhat.com/security/cve/CVE-2022-21496
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496
https://errata.almalinux.org/8/ALSA-2022-1491.html
https://linux.oracle.com/cve/CVE-2022-21496.html
https://linux.oracle.com/errata/ELSA-2022-2137.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21496
https://security.netapp.com/advisory/ntap-20220429-0006/
https://ubuntu.com/security/notices/USN-5388-1
https://ubuntu.com/security/notices/USN-5388-2
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21496
https://www.debian.org/security/2022/dsa-5128
https://www.debian.org/security/2022/dsa-5131
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21540 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.342.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2022:5736
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21549.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
https://access.redhat.com/security/cve/CVE-2022-21540
https://bugzilla.redhat.com/2108540
https://bugzilla.redhat.com/2108543
https://bugzilla.redhat.com/2108547
https://bugzilla.redhat.com/2108554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540
https://errata.almalinux.org/9/ALSA-2022-5736.html
https://linux.oracle.com/cve/CVE-2022-21540.html
https://linux.oracle.com/errata/ELSA-2022-5736.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
https://nvd.nist.gov/vuln/detail/CVE-2022-21540
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20220729-0009/
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21540
https://www.debian.org/security/2022/dsa-5188
https://www.debian.org/security/2022/dsa-5192
https://www.oracle.com/security-alerts/cpujul2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21541 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.342.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2022:5736
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21540.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21541.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21549.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34169.json
https://access.redhat.com/security/cve/CVE-2022-21541
https://bugzilla.redhat.com/2108540
https://bugzilla.redhat.com/2108543
https://bugzilla.redhat.com/2108547
https://bugzilla.redhat.com/2108554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541
https://errata.almalinux.org/9/ALSA-2022-5736.html
https://linux.oracle.com/cve/CVE-2022-21541.html
https://linux.oracle.com/errata/ELSA-2022-5736.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4YNJSJ64NPCNKFPNBYITNZU5H3L4D6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5OZNAZJ4YHLOKRRRZSWRT5OJ25E4XLM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN3EVGR7FD3ZLV5SBTJXUIDCMSK4QUE2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KO3DXNKZ4EU3UZBT6AAR4XRKCD73KLMO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XPOTPPBZIPFBZHQE5E7OW6PDACUMCJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YULPNO3PAWMEQQZV2C54I3H3ZOXFZUTB/
https://nvd.nist.gov/vuln/detail/CVE-2022-21541
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20220729-0009/
https://ubuntu.com/security/notices/USN-5546-1
https://ubuntu.com/security/notices/USN-5546-2
https://www.cve.org/CVERecord?id=CVE-2022-21541
https://www.debian.org/security/2022/dsa-5188
https://www.debian.org/security/2022/dsa-5192
https://www.oracle.com/security-alerts/cpujul2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21626 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.352.b08-2.el7_9 |
https://access.redhat.com/errata/RHSA-2022:7013
https://access.redhat.com/security/cve/CVE-2022-21626
https://bugzilla.redhat.com/2133745
https://bugzilla.redhat.com/2133753
https://bugzilla.redhat.com/2133765
https://bugzilla.redhat.com/2133769
https://bugzilla.redhat.com/2133776
https://bugzilla.redhat.com/2133817
https://bugzilla.redhat.com/show_bug.cgi?id=2131863
https://bugzilla.redhat.com/show_bug.cgi?id=2133745
https://bugzilla.redhat.com/show_bug.cgi?id=2133753
https://bugzilla.redhat.com/show_bug.cgi?id=2133765
https://bugzilla.redhat.com/show_bug.cgi?id=2133769
https://bugzilla.redhat.com/show_bug.cgi?id=2133776
https://bugzilla.redhat.com/show_bug.cgi?id=2133817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
https://errata.almalinux.org/9/ALSA-2022-7013.html
https://errata.rockylinux.org/RLSA-2022:7012
https://linux.oracle.com/cve/CVE-2022-21626.html
https://linux.oracle.com/errata/ELSA-2022-7013.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
https://nvd.nist.gov/vuln/detail/CVE-2022-21626
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20221028-0012/
https://ubuntu.com/security/notices/USN-5719-1
https://www.cve.org/CVERecord?id=CVE-2022-21626
https://www.oracle.com/security-alerts/cpuoct2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21628 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.352.b08-2.el7_9 |
https://access.redhat.com/errata/RHSA-2022:7013
https://access.redhat.com/security/cve/CVE-2022-21628
https://bugzilla.redhat.com/2133745
https://bugzilla.redhat.com/2133753
https://bugzilla.redhat.com/2133765
https://bugzilla.redhat.com/2133769
https://bugzilla.redhat.com/2133776
https://bugzilla.redhat.com/2133817
https://bugzilla.redhat.com/show_bug.cgi?id=2131863
https://bugzilla.redhat.com/show_bug.cgi?id=2133745
https://bugzilla.redhat.com/show_bug.cgi?id=2133753
https://bugzilla.redhat.com/show_bug.cgi?id=2133765
https://bugzilla.redhat.com/show_bug.cgi?id=2133769
https://bugzilla.redhat.com/show_bug.cgi?id=2133776
https://bugzilla.redhat.com/show_bug.cgi?id=2133817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
https://errata.almalinux.org/9/ALSA-2022-7013.html
https://errata.rockylinux.org/RLSA-2022:7012
https://linux.oracle.com/cve/CVE-2022-21628.html
https://linux.oracle.com/errata/ELSA-2022-7013.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
https://nvd.nist.gov/vuln/detail/CVE-2022-21628
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20221028-0012/
https://ubuntu.com/security/notices/USN-5719-1
https://www.cve.org/CVERecord?id=CVE-2022-21628
https://www.oracle.com/security-alerts/cpuoct2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2023-21830 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.362.b08-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:0210
https://access.redhat.com/security/cve/CVE-2023-21830
https://bugzilla.redhat.com/2160475
https://bugzilla.redhat.com/2160490
https://bugzilla.redhat.com/show_bug.cgi?id=2159912
https://bugzilla.redhat.com/show_bug.cgi?id=2160475
https://bugzilla.redhat.com/show_bug.cgi?id=2160490
https://bugzilla.redhat.com/show_bug.cgi?id=2163594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
https://errata.almalinux.org/9/ALSA-2023-0210.html
https://errata.rockylinux.org/RLSA-2023:0210
https://linux.oracle.com/cve/CVE-2023-21830.html
https://linux.oracle.com/errata/ELSA-2023-0210.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21830
https://security.gentoo.org/glsa/202401-25
https://ubuntu.com/security/notices/USN-5898-1
https://www.cve.org/CVERecord?id=CVE-2023-21830
https://www.oracle.com/java/technologies/javase/8u361-relnotes.html
https://www.oracle.com/security-alerts/cpujan2023.html
https://www.oracle.com/security-alerts/cpujul2023.html
|
| java-1.8.0-openjdk-headless |
CVE-2023-21939 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21939
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21939.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21939
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21939
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk-headless |
CVE-2023-21954 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21954
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21954.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21954
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21954
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk-headless |
CVE-2023-21967 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21967
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21967.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21967
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21967
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk-headless |
CVE-2023-22049 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.382.b05-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:4178
https://access.redhat.com/security/cve/CVE-2023-22049
https://bugzilla.redhat.com/2221645
https://bugzilla.redhat.com/2221647
https://bugzilla.redhat.com/show_bug.cgi?id=2220662
https://bugzilla.redhat.com/show_bug.cgi?id=2221645
https://bugzilla.redhat.com/show_bug.cgi?id=2221647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
https://errata.almalinux.org/9/ALSA-2023-4178.html
https://errata.rockylinux.org/RLSA-2023:4178
https://linux.oracle.com/cve/CVE-2023-22049.html
https://linux.oracle.com/errata/ELSA-2023-4233.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-22049
https://security.netapp.com/advisory/ntap-20230725-0006/
https://ubuntu.com/security/notices/USN-6263-1
https://ubuntu.com/security/notices/USN-6272-1
https://www.cve.org/CVERecord?id=CVE-2023-22049
https://www.debian.org/security/2023/dsa-5458
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpujul2023.html
|
| java-1.8.0-openjdk-headless |
CVE-2023-22067 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.392.b08-2.el7_9 |
https://access.redhat.com/errata/RHSA-2023:5733
https://access.redhat.com/security/cve/CVE-2023-22067
https://bugzilla.redhat.com/2237709
https://bugzilla.redhat.com/2243627
https://bugzilla.redhat.com/2243637
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22067
https://errata.almalinux.org/9/ALSA-2023-5733.html
https://linux.oracle.com/cve/CVE-2023-22067.html
https://linux.oracle.com/errata/ELSA-2023-5761.html
https://nvd.nist.gov/vuln/detail/CVE-2023-22067
https://security.netapp.com/advisory/ntap-20231027-0006/
https://ubuntu.com/security/notices/USN-6528-1
https://www.cve.org/CVERecord?id=CVE-2023-22067
https://www.debian.org/security/2023/dsa-5537
https://www.oracle.com/java/technologies/javase/8u391-relnotes.html#JDK-8303384
https://www.oracle.com/security-alerts/cpuoct2023.html
|
| java-1.8.0-openjdk-headless |
CVE-2023-22081 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.392.b08-2.el7_9 |
https://access.redhat.com/errata/RHSA-2023:6738
https://access.redhat.com/security/cve/CVE-2023-22081
https://bugzilla.redhat.com/2243627
https://bugzilla.redhat.com/2243805
https://bugzilla.redhat.com/show_bug.cgi?id=2237170
https://bugzilla.redhat.com/show_bug.cgi?id=2243627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081
https://errata.almalinux.org/9/ALSA-2023-6738.html
https://errata.rockylinux.org/RLSA-2023:5742
https://linux.oracle.com/cve/CVE-2023-22081.html
https://linux.oracle.com/errata/ELSA-2023-6887.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00041.html
https://nvd.nist.gov/vuln/detail/CVE-2023-22081
https://security.netapp.com/advisory/ntap-20231027-0006/
https://ubuntu.com/security/notices/USN-6527-1
https://ubuntu.com/security/notices/USN-6528-1
https://www.cve.org/CVERecord?id=CVE-2023-22081
https://www.debian.org/security/2023/dsa-5537
https://www.debian.org/security/2023/dsa-5548
https://www.oracle.com/security-alerts/cpuoct2023.html
|
| java-1.8.0-openjdk-headless |
CVE-2024-20919 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.402.b06-1.el7_9 |
https://access.redhat.com/errata/RHSA-2024:0267
https://access.redhat.com/security/cve/CVE-2024-20919
https://bugzilla.redhat.com/2257720
https://bugzilla.redhat.com/2257728
https://bugzilla.redhat.com/2257837
https://bugzilla.redhat.com/2257853
https://bugzilla.redhat.com/2257859
https://bugzilla.redhat.com/2257874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919
https://errata.almalinux.org/9/ALSA-2024-0267.html
https://linux.oracle.com/cve/CVE-2024-20919.html
https://linux.oracle.com/errata/ELSA-2024-0267.html
https://nvd.nist.gov/vuln/detail/CVE-2024-20919
https://ubuntu.com/security/notices/USN-6660-1
https://ubuntu.com/security/notices/USN-6661-1
https://ubuntu.com/security/notices/USN-6662-1
https://www.cve.org/CVERecord?id=CVE-2024-20919
https://www.oracle.com/security-alerts/cpujan2024.html
https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA
|
| java-1.8.0-openjdk-headless |
CVE-2024-20921 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.402.b06-1.el7_9 |
https://access.redhat.com/errata/RHSA-2024:0267
https://access.redhat.com/security/cve/CVE-2024-20921
https://bugzilla.redhat.com/2257720
https://bugzilla.redhat.com/2257728
https://bugzilla.redhat.com/2257837
https://bugzilla.redhat.com/2257853
https://bugzilla.redhat.com/2257859
https://bugzilla.redhat.com/2257874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921
https://errata.almalinux.org/9/ALSA-2024-0267.html
https://linux.oracle.com/cve/CVE-2024-20921.html
https://linux.oracle.com/errata/ELSA-2024-0267.html
https://nvd.nist.gov/vuln/detail/CVE-2024-20921
https://ubuntu.com/security/notices/USN-6660-1
https://ubuntu.com/security/notices/USN-6661-1
https://ubuntu.com/security/notices/USN-6662-1
https://www.cve.org/CVERecord?id=CVE-2024-20921
https://www.oracle.com/security-alerts/cpujan2024.html
https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA
|
| java-1.8.0-openjdk-headless |
CVE-2024-20926 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.402.b06-1.el7_9 |
https://access.redhat.com/errata/RHSA-2024:0266
https://access.redhat.com/security/cve/CVE-2024-20926
https://bugzilla.redhat.com/2257728
https://bugzilla.redhat.com/2257837
https://bugzilla.redhat.com/2257850
https://bugzilla.redhat.com/2257853
https://bugzilla.redhat.com/2257859
https://bugzilla.redhat.com/2257874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926
https://errata.almalinux.org/9/ALSA-2024-0266.html
https://linux.oracle.com/cve/CVE-2024-20926.html
https://linux.oracle.com/errata/ELSA-2024-0266.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2024-20926
https://security.netapp.com/advisory/ntap-20240201-0002/
https://ubuntu.com/security/notices/USN-6660-1
https://www.cve.org/CVERecord?id=CVE-2024-20926
https://www.oracle.com/security-alerts/cpujan2024.html
https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA
|
| java-1.8.0-openjdk-headless |
CVE-2024-20945 |
MEDIUM |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.402.b06-1.el7_9 |
https://access.redhat.com/errata/RHSA-2024:0267
https://access.redhat.com/security/cve/CVE-2024-20945
https://bugzilla.redhat.com/2257720
https://bugzilla.redhat.com/2257728
https://bugzilla.redhat.com/2257837
https://bugzilla.redhat.com/2257853
https://bugzilla.redhat.com/2257859
https://bugzilla.redhat.com/2257874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945
https://errata.almalinux.org/9/ALSA-2024-0267.html
https://linux.oracle.com/cve/CVE-2024-20945.html
https://linux.oracle.com/errata/ELSA-2024-0267.html
https://nvd.nist.gov/vuln/detail/CVE-2024-20945
https://ubuntu.com/security/notices/USN-6660-1
https://ubuntu.com/security/notices/USN-6661-1
https://ubuntu.com/security/notices/USN-6662-1
https://www.cve.org/CVERecord?id=CVE-2024-20945
https://www.oracle.com/security-alerts/cpujan2024.html
https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA
|
| java-1.8.0-openjdk-headless |
CVE-2017-10053 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/3832334.xml
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99842
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/errata/RHSA-2017:2469
https://access.redhat.com/errata/RHSA-2017:2481
https://access.redhat.com/errata/RHSA-2017:2530
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10053
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053
https://linux.oracle.com/cve/CVE-2017-10053.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10053
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10053
|
| java-1.8.0-openjdk-headless |
CVE-2017-10135 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.securityfocus.com/bid/99839
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:2424
https://access.redhat.com/security/cve/CVE-2017-10135
https://cert.vde.com/en-us/advisories/vde-2017-002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135
https://linux.oracle.com/cve/CVE-2017-10135.html
https://linux.oracle.com/errata/ELSA-2017-2424.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10135
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://ubuntu.com/security/notices/USN-3396-1
https://www.cve.org/CVERecord?id=CVE-2017-10135
|
| java-1.8.0-openjdk-headless |
CVE-2017-10193 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.141-1.b16.el7_3 |
http://www.debian.org/security/2017/dsa-3919
http://www.debian.org/security/2017/dsa-3954
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html#AppendixJAVA
http://www.oracle.com/technetwork/security-advisory/cpujul2017verbose-3236625.html#JAVA
http://www.securityfocus.com/bid/99854
http://www.securitytracker.com/id/1038931
https://access.redhat.com/errata/RHSA-2017:1789
https://access.redhat.com/errata/RHSA-2017:1790
https://access.redhat.com/errata/RHSA-2017:1791
https://access.redhat.com/errata/RHSA-2017:1792
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/security/cve/CVE-2017-10193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193
https://linux.oracle.com/cve/CVE-2017-10193.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10193
https://security.gentoo.org/glsa/201709-22
https://security.netapp.com/advisory/ntap-20170720-0001/
https://ubuntu.com/security/notices/USN-3366-1
https://www.cve.org/CVERecord?id=CVE-2017-10193
|
| java-1.8.0-openjdk-headless |
CVE-2017-10345 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.151-1.b12.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html#AppendixJAVA
http://www.securityfocus.com/bid/101396
http://www.securitytracker.com/id/1039596
https://access.redhat.com/errata/RHSA-2017:2998
https://access.redhat.com/errata/RHSA-2017:2999
https://access.redhat.com/errata/RHSA-2017:3046
https://access.redhat.com/errata/RHSA-2017:3047
https://access.redhat.com/errata/RHSA-2017:3264
https://access.redhat.com/errata/RHSA-2017:3267
https://access.redhat.com/errata/RHSA-2017:3268
https://access.redhat.com/errata/RHSA-2017:3392
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-10345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345
https://linux.oracle.com/cve/CVE-2017-10345.html
https://linux.oracle.com/errata/ELSA-2017-3392.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10345
https://security.gentoo.org/glsa/201710-31
https://security.gentoo.org/glsa/201711-14
https://security.netapp.com/advisory/ntap-20171019-0001/
https://ubuntu.com/security/notices/USN-3473-1
https://ubuntu.com/security/notices/USN-3497-1
https://www.cve.org/CVERecord?id=CVE-2017-10345
https://www.debian.org/security/2017/dsa-4015
https://www.debian.org/security/2017/dsa-4048
|
| java-1.8.0-openjdk-headless |
CVE-2017-3533 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.131-2.b11.el7_3 |
http://www.debian.org/security/2017/dsa-3858
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixJAVA
http://www.securityfocus.com/bid/97740
http://www.securitytracker.com/id/1038286
https://access.redhat.com/errata/RHSA-2017:1108
https://access.redhat.com/errata/RHSA-2017:1109
https://access.redhat.com/errata/RHSA-2017:1117
https://access.redhat.com/errata/RHSA-2017:1118
https://access.redhat.com/errata/RHSA-2017:1119
https://access.redhat.com/errata/RHSA-2017:1204
https://access.redhat.com/errata/RHSA-2017:1220
https://access.redhat.com/errata/RHSA-2017:1221
https://access.redhat.com/errata/RHSA-2017:1222
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-3533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533
https://linux.oracle.com/cve/CVE-2017-3533.html
https://linux.oracle.com/errata/ELSA-2017-1204.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3533
https://security.gentoo.org/glsa/201705-03
https://security.gentoo.org/glsa/201707-01
https://ubuntu.com/security/notices/USN-3275-1
https://ubuntu.com/security/notices/USN-3275-2
https://www.cve.org/CVERecord?id=CVE-2017-3533
|
| java-1.8.0-openjdk-headless |
CVE-2017-3544 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.131-2.b11.el7_3 |
http://www.debian.org/security/2017/dsa-3858
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixJAVA
http://www.securityfocus.com/bid/97745
http://www.securitytracker.com/id/1038286
https://access.redhat.com/errata/RHSA-2017:1108
https://access.redhat.com/errata/RHSA-2017:1109
https://access.redhat.com/errata/RHSA-2017:1117
https://access.redhat.com/errata/RHSA-2017:1118
https://access.redhat.com/errata/RHSA-2017:1119
https://access.redhat.com/errata/RHSA-2017:1204
https://access.redhat.com/errata/RHSA-2017:1220
https://access.redhat.com/errata/RHSA-2017:1221
https://access.redhat.com/errata/RHSA-2017:1222
https://access.redhat.com/errata/RHSA-2017:3453
https://access.redhat.com/security/cve/CVE-2017-3544
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544
https://linux.oracle.com/cve/CVE-2017-3544.html
https://linux.oracle.com/errata/ELSA-2017-1204.html
https://nvd.nist.gov/vuln/detail/CVE-2017-3544
https://security.gentoo.org/glsa/201705-03
https://security.gentoo.org/glsa/201707-01
https://source.android.com/security/bulletin/2017-07-01
https://ubuntu.com/security/notices/USN-3275-1
https://ubuntu.com/security/notices/USN-3275-2
https://www.cve.org/CVERecord?id=CVE-2017-3544
|
| java-1.8.0-openjdk-headless |
CVE-2018-2579 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.161-0.b14.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.securityfocus.com/bid/102663
http://www.securitytracker.com/id/1040203
https://access.redhat.com/errata/RHSA-2018:0095
https://access.redhat.com/errata/RHSA-2018:0099
https://access.redhat.com/errata/RHSA-2018:0100
https://access.redhat.com/errata/RHSA-2018:0115
https://access.redhat.com/errata/RHSA-2018:0349
https://access.redhat.com/errata/RHSA-2018:0351
https://access.redhat.com/errata/RHSA-2018:0352
https://access.redhat.com/errata/RHSA-2018:0458
https://access.redhat.com/errata/RHSA-2018:0521
https://access.redhat.com/errata/RHSA-2018:1463
https://access.redhat.com/errata/RHSA-2018:1812
https://access.redhat.com/security/cve/CVE-2018-2579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2579.html
https://linux.oracle.com/errata/ELSA-2018-0349.html
https://lists.debian.org/debian-lts-announce/2018/04/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2579
https://security.netapp.com/advisory/ntap-20180117-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03911en_us
https://ubuntu.com/security/notices/USN-3613-1
https://ubuntu.com/security/notices/USN-3614-1
https://usn.ubuntu.com/3613-1/
https://usn.ubuntu.com/3614-1/
https://www.cve.org/CVERecord?id=CVE-2018-2579
https://www.debian.org/security/2018/dsa-4144
https://www.debian.org/security/2018/dsa-4166
|
| java-1.8.0-openjdk-headless |
CVE-2018-2790 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.171-7.b10.el7 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/103877
http://www.securitytracker.com/id/1040697
https://access.redhat.com/errata/RHSA-2018:1188
https://access.redhat.com/errata/RHSA-2018:1191
https://access.redhat.com/errata/RHSA-2018:1201
https://access.redhat.com/errata/RHSA-2018:1202
https://access.redhat.com/errata/RHSA-2018:1203
https://access.redhat.com/errata/RHSA-2018:1204
https://access.redhat.com/errata/RHSA-2018:1205
https://access.redhat.com/errata/RHSA-2018:1206
https://access.redhat.com/errata/RHSA-2018:1270
https://access.redhat.com/errata/RHSA-2018:1278
https://access.redhat.com/errata/RHSA-2018:1721
https://access.redhat.com/errata/RHSA-2018:1722
https://access.redhat.com/errata/RHSA-2018:1723
https://access.redhat.com/errata/RHSA-2018:1724
https://access.redhat.com/errata/RHSA-2018:1974
https://access.redhat.com/errata/RHSA-2018:1975
https://access.redhat.com/security/cve/CVE-2018-2790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2018-2790.html
https://linux.oracle.com/errata/ELSA-2018-1278.html
https://nvd.nist.gov/vuln/detail/CVE-2018-2790
https://security.gentoo.org/glsa/201903-14
https://security.netapp.com/advisory/ntap-20180419-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03857en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03915en_us
https://ubuntu.com/security/notices/USN-3644-1
https://ubuntu.com/security/notices/USN-3691-1
https://usn.ubuntu.com/3644-1/
https://usn.ubuntu.com/3691-1/
https://www.cve.org/CVERecord?id=CVE-2018-2790
https://www.debian.org/security/2018/dsa-4185
https://www.debian.org/security/2018/dsa-4225
|
| java-1.8.0-openjdk-headless |
CVE-2019-2786 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.222.b10-0.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00044.html
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://access.redhat.com/errata/RHSA-2019:2585
https://access.redhat.com/errata/RHSA-2019:2590
https://access.redhat.com/errata/RHSA-2019:2592
https://access.redhat.com/errata/RHSA-2019:2737
https://access.redhat.com/security/cve/CVE-2019-2786
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786
https://linux.oracle.com/cve/CVE-2019-2786.html
https://linux.oracle.com/errata/ELSA-2019-1840.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2786
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03977en_us
https://ubuntu.com/security/notices/USN-4080-1
https://ubuntu.com/security/notices/USN-4083-1
https://usn.ubuntu.com/4080-1/
https://usn.ubuntu.com/4083-1/
https://www.cve.org/CVERecord?id=CVE-2019-2786
https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/5572395.xml
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| java-1.8.0-openjdk-headless |
CVE-2019-2945 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2945
https://linux.oracle.com/cve/CVE-2019-2945.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2945
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2945
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk-headless |
CVE-2019-2962 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2962
https://linux.oracle.com/cve/CVE-2019-2962.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2962
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2962
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk-headless |
CVE-2019-2964 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2964
https://linux.oracle.com/cve/CVE-2019-2964.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2964
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2964
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk-headless |
CVE-2019-2973 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2973
https://linux.oracle.com/cve/CVE-2019-2973.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2973
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2973
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk-headless |
CVE-2019-2981 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2981
https://linux.oracle.com/cve/CVE-2019-2981.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2981
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2981
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk-headless |
CVE-2019-2983 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2983
https://linux.oracle.com/cve/CVE-2019-2983.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2983
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2983
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk-headless |
CVE-2019-2987 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/security/cve/CVE-2019-2987
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2987
https://linux.oracle.com/cve/CVE-2019-2987.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2987
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2987
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
https://www.oracle.com/security-alerts/cpuoct2019.html
|
| java-1.8.0-openjdk-headless |
CVE-2019-2988 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2988
https://linux.oracle.com/cve/CVE-2019-2988.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2988
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2988
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk-headless |
CVE-2019-2992 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2992
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2992
https://linux.oracle.com/cve/CVE-2019-2992.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2992
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2992
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk-headless |
CVE-2019-2999 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.232.b09-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://access.redhat.com/errata/RHSA-2019:3134
https://access.redhat.com/errata/RHSA-2019:3135
https://access.redhat.com/errata/RHSA-2019:3136
https://access.redhat.com/errata/RHSA-2019:3157
https://access.redhat.com/errata/RHSA-2019:3158
https://access.redhat.com/errata/RHSA-2019:4109
https://access.redhat.com/errata/RHSA-2019:4110
https://access.redhat.com/errata/RHSA-2019:4113
https://access.redhat.com/errata/RHSA-2019:4115
https://access.redhat.com/errata/RHSA-2020:0006
https://access.redhat.com/errata/RHSA-2020:0046
https://access.redhat.com/security/cve/CVE-2019-2999
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2999
https://linux.oracle.com/cve/CVE-2019-2999.html
https://linux.oracle.com/errata/ELSA-2019-3158.html
https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2019-2999
https://seclists.org/bugtraq/2019/Oct/27
https://seclists.org/bugtraq/2019/Oct/31
https://security.netapp.com/advisory/ntap-20191017-0001/
https://ubuntu.com/security/notices/USN-4223-1
https://usn.ubuntu.com/4223-1/
https://www.cve.org/CVERecord?id=CVE-2019-2999
https://www.debian.org/security/2019/dsa-4546
https://www.debian.org/security/2019/dsa-4548
|
| java-1.8.0-openjdk-headless |
CVE-2020-14577 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.262.b10-0.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14577
https://linux.oracle.com/cve/CVE-2020-14577.html
https://linux.oracle.com/errata/ELSA-2020-2985.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CFJPOYF3CWYEPCDOAOCNFJTQIKKWPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DFZ36XIW5ENQAW6BB7WHRFFTTJX7KGMR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEPHBZPNSLX43B26DWKB7OS6AROTS2BO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQUMIAON2YEFRONMIUVHAKYCIOLICDBA/
https://nvd.nist.gov/vuln/detail/CVE-2020-14577
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200717-0005/
https://ubuntu.com/security/notices/USN-4433-1
https://ubuntu.com/security/notices/USN-4453-1
https://usn.ubuntu.com/4433-1/
https://usn.ubuntu.com/4453-1/
https://www.cve.org/CVERecord?id=CVE-2020-14577
https://www.debian.org/security/2020/dsa-4734
https://www.oracle.com/security-alerts/cpujul2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-14779 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14779
https://linux.oracle.com/cve/CVE-2020-14779.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6CJCO52DHIQJHLPF6HMTC5Z2VKFRQMY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OMJMTXFJRONFT72YAEQNRFKYZZU4W3HD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XKRGVMZT3EUUWKUA6DBT56FT3UOKPHQ2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVPLGNHNJ4UJ6IO6R2XXEKCTCI2DRPDQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCKZAI4AWSKO5O5VDXHFFKNLOZGZ3KEE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7XEONOP6JB7SD7AMUWZTLZF2L4QD546/
https://nvd.nist.gov/vuln/detail/CVE-2020-14779
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14779
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-14796 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.272.b10-1.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00041.html
https://access.redhat.com/security/cve/CVE-2020-14796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14796
https://linux.oracle.com/cve/CVE-2020-14796.html
https://linux.oracle.com/errata/ELSA-2020-4350.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14796
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20201023-0004/
https://ubuntu.com/security/notices/USN-4607-1
https://ubuntu.com/security/notices/USN-4607-2
https://www.cve.org/CVERecord?id=CVE-2020-14796
https://www.debian.org/security/2020/dsa-4779
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2583 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0122
https://access.redhat.com/errata/RHSA-2020:0128
https://access.redhat.com/errata/RHSA-2020:0157
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0232
https://access.redhat.com/errata/RHSA-2020:0465
https://access.redhat.com/errata/RHSA-2020:0467
https://access.redhat.com/errata/RHSA-2020:0468
https://access.redhat.com/errata/RHSA-2020:0469
https://access.redhat.com/errata/RHSA-2020:0470
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2583
https://kc.mcafee.com/corporate/index?page=content&id=SB10315
https://linux.oracle.com/cve/CVE-2020-2583.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2583
https://seclists.org/bugtraq/2020/Feb/22
https://seclists.org/bugtraq/2020/Jan/24
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2583
https://www.debian.org/security/2020/dsa-4605
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2659 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.242.b08-0.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00060.html
https://access.redhat.com/errata/RHSA-2020:0157
https://access.redhat.com/errata/RHSA-2020:0196
https://access.redhat.com/errata/RHSA-2020:0202
https://access.redhat.com/errata/RHSA-2020:0231
https://access.redhat.com/errata/RHSA-2020:0465
https://access.redhat.com/errata/RHSA-2020:0467
https://access.redhat.com/errata/RHSA-2020:0468
https://access.redhat.com/errata/RHSA-2020:0469
https://access.redhat.com/errata/RHSA-2020:0470
https://access.redhat.com/errata/RHSA-2020:0541
https://access.redhat.com/errata/RHSA-2020:0632
https://access.redhat.com/security/cve/CVE-2020-2659
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2659
https://linux.oracle.com/cve/CVE-2020-2659.html
https://linux.oracle.com/errata/ELSA-2020-0632.html
https://lists.debian.org/debian-lts-announce/2020/02/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-2659
https://seclists.org/bugtraq/2020/Feb/22
https://security.gentoo.org/glsa/202101-19
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4257-1
https://usn.ubuntu.com/4257-1/
https://www.cve.org/CVERecord?id=CVE-2020-2659
https://www.debian.org/security/2020/dsa-4621
https://www.oracle.com/security-alerts/cpujan2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2754 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2754
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-2754.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2754
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2754
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2755 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2755
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-2755.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2755
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2755
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2756 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2756
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2756
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-2756.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2756
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2756
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2020-2757 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.252.b09-2.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html
https://access.redhat.com/security/cve/CVE-2020-2757
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2757
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-2757.html
https://linux.oracle.com/errata/ELSA-2020-1515.html
https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/
https://nvd.nist.gov/vuln/detail/CVE-2020-2757
https://security.gentoo.org/glsa/202006-22
https://security.gentoo.org/glsa/202209-15
https://security.netapp.com/advisory/ntap-20200416-0004/
https://ubuntu.com/security/notices/USN-4337-1
https://usn.ubuntu.com/4337-1/
https://www.cve.org/CVERecord?id=CVE-2020-2757
https://www.debian.org/security/2020/dsa-4662
https://www.debian.org/security/2020/dsa-4668
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-35588 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35565.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35588.json
https://access.redhat.com/security/cve/CVE-2021-35588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35588
https://linux.oracle.com/cve/CVE-2021-35588.html
https://linux.oracle.com/errata/ELSA-2021-3893.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://nvd.nist.gov/vuln/detail/CVE-2021-35588
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35588
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2021-35603 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.312.b07-1.el7_9 |
https://access.redhat.com/security/cve/CVE-2021-35603
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603
https://linux.oracle.com/cve/CVE-2021-35603.html
https://linux.oracle.com/errata/ELSA-2021-4135.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://nvd.nist.gov/vuln/detail/CVE-2021-35603
https://security.gentoo.org/glsa/202209-05
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-5202-1
https://www.cve.org/CVERecord?id=CVE-2021-35603
https://www.debian.org/security/2021/dsa-5000
https://www.debian.org/security/2021/dsa-5012
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21619 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.352.b08-2.el7_9 |
https://access.redhat.com/errata/RHSA-2022:7013
https://access.redhat.com/security/cve/CVE-2022-21619
https://bugzilla.redhat.com/2133745
https://bugzilla.redhat.com/2133753
https://bugzilla.redhat.com/2133765
https://bugzilla.redhat.com/2133769
https://bugzilla.redhat.com/2133776
https://bugzilla.redhat.com/2133817
https://bugzilla.redhat.com/show_bug.cgi?id=2131863
https://bugzilla.redhat.com/show_bug.cgi?id=2133745
https://bugzilla.redhat.com/show_bug.cgi?id=2133753
https://bugzilla.redhat.com/show_bug.cgi?id=2133765
https://bugzilla.redhat.com/show_bug.cgi?id=2133769
https://bugzilla.redhat.com/show_bug.cgi?id=2133776
https://bugzilla.redhat.com/show_bug.cgi?id=2133817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
https://errata.almalinux.org/9/ALSA-2022-7013.html
https://errata.rockylinux.org/RLSA-2022:7012
https://linux.oracle.com/cve/CVE-2022-21619.html
https://linux.oracle.com/errata/ELSA-2022-7013.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
https://nvd.nist.gov/vuln/detail/CVE-2022-21619
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20221028-0012/
https://ubuntu.com/security/notices/USN-5719-1
https://www.cve.org/CVERecord?id=CVE-2022-21619
https://www.oracle.com/security-alerts/cpuoct2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2022-21624 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.352.b08-2.el7_9 |
https://access.redhat.com/errata/RHSA-2022:7013
https://access.redhat.com/security/cve/CVE-2022-21624
https://bugzilla.redhat.com/2133745
https://bugzilla.redhat.com/2133753
https://bugzilla.redhat.com/2133765
https://bugzilla.redhat.com/2133769
https://bugzilla.redhat.com/2133776
https://bugzilla.redhat.com/2133817
https://bugzilla.redhat.com/show_bug.cgi?id=2131863
https://bugzilla.redhat.com/show_bug.cgi?id=2133745
https://bugzilla.redhat.com/show_bug.cgi?id=2133753
https://bugzilla.redhat.com/show_bug.cgi?id=2133765
https://bugzilla.redhat.com/show_bug.cgi?id=2133769
https://bugzilla.redhat.com/show_bug.cgi?id=2133776
https://bugzilla.redhat.com/show_bug.cgi?id=2133817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399
https://errata.almalinux.org/9/ALSA-2022-7013.html
https://errata.rockylinux.org/RLSA-2022:7012
https://linux.oracle.com/cve/CVE-2022-21624.html
https://linux.oracle.com/errata/ELSA-2022-7013.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3ARF4QF4N3X5GSFHXUBWARGLISGKJ33R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QLQ7OD33W6LT3HWI7VYDFFJLV75Y73K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HNGMDNIHAA73BEX6XPA2IMXJSGOKKYE6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PB3CIGOFG7CENUVVE4FFZT2HI5FO77XU/
https://nvd.nist.gov/vuln/detail/CVE-2022-21624
https://security.gentoo.org/glsa/202401-25
https://security.netapp.com/advisory/ntap-20221028-0012/
https://ubuntu.com/security/notices/USN-5719-1
https://www.cve.org/CVERecord?id=CVE-2022-21624
https://www.oracle.com/security-alerts/cpuoct2022.html
|
| java-1.8.0-openjdk-headless |
CVE-2023-21843 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.362.b08-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:0210
https://access.redhat.com/security/cve/CVE-2023-21843
https://bugzilla.redhat.com/2160475
https://bugzilla.redhat.com/2160490
https://bugzilla.redhat.com/show_bug.cgi?id=2159912
https://bugzilla.redhat.com/show_bug.cgi?id=2160475
https://bugzilla.redhat.com/show_bug.cgi?id=2160490
https://bugzilla.redhat.com/show_bug.cgi?id=2163594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843
https://errata.almalinux.org/9/ALSA-2023-0210.html
https://errata.rockylinux.org/RLSA-2023:0210
https://linux.oracle.com/cve/CVE-2023-21843.html
https://linux.oracle.com/errata/ELSA-2023-0210.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21843
https://security.gentoo.org/glsa/202401-25
https://ubuntu.com/security/notices/USN-5897-1
https://ubuntu.com/security/notices/USN-5898-1
https://www.cve.org/CVERecord?id=CVE-2023-21843
https://www.oracle.com/security-alerts/cpujan2023.html
|
| java-1.8.0-openjdk-headless |
CVE-2023-21937 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21937
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21937.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21937
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21937
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk-headless |
CVE-2023-21938 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21938
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21938.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21938
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21938
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk-headless |
CVE-2023-21968 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.372.b07-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:1909
https://access.redhat.com/security/cve/CVE-2023-21968
https://bugzilla.redhat.com/2187435
https://bugzilla.redhat.com/2187441
https://bugzilla.redhat.com/2187704
https://bugzilla.redhat.com/2187724
https://bugzilla.redhat.com/2187758
https://bugzilla.redhat.com/2187790
https://bugzilla.redhat.com/2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2187435
https://bugzilla.redhat.com/show_bug.cgi?id=2187441
https://bugzilla.redhat.com/show_bug.cgi?id=2187704
https://bugzilla.redhat.com/show_bug.cgi?id=2187724
https://bugzilla.redhat.com/show_bug.cgi?id=2187758
https://bugzilla.redhat.com/show_bug.cgi?id=2187790
https://bugzilla.redhat.com/show_bug.cgi?id=2187802
https://bugzilla.redhat.com/show_bug.cgi?id=2188024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968
https://errata.almalinux.org/9/ALSA-2023-1909.html
https://errata.rockylinux.org/RLSA-2023:1909
https://linux.oracle.com/cve/CVE-2023-21968.html
https://linux.oracle.com/errata/ELSA-2023-1909.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-21968
https://security.netapp.com/advisory/ntap-20230427-0008/
https://ubuntu.com/security/notices/USN-6077-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-21968
https://www.debian.org/security/2023/dsa-5430
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpuapr2023.html
|
| java-1.8.0-openjdk-headless |
CVE-2023-22045 |
LOW |
1:1.8.0.91-0.b14.el7_2 |
1:1.8.0.382.b05-1.el7_9 |
https://access.redhat.com/errata/RHSA-2023:4178
https://access.redhat.com/security/cve/CVE-2023-22045
https://bugzilla.redhat.com/2221645
https://bugzilla.redhat.com/2221647
https://bugzilla.redhat.com/show_bug.cgi?id=2220662
https://bugzilla.redhat.com/show_bug.cgi?id=2221645
https://bugzilla.redhat.com/show_bug.cgi?id=2221647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049
https://errata.almalinux.org/9/ALSA-2023-4178.html
https://errata.rockylinux.org/RLSA-2023:4178
https://linux.oracle.com/cve/CVE-2023-22045.html
https://linux.oracle.com/errata/ELSA-2023-4233.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2023-22045
https://security.netapp.com/advisory/ntap-20230725-0006/
https://ubuntu.com/security/notices/USN-6263-1
https://ubuntu.com/security/notices/USN-6272-1
https://www.cve.org/CVERecord?id=CVE-2023-22045
https://www.debian.org/security/2023/dsa-5458
https://www.debian.org/security/2023/dsa-5478
https://www.oracle.com/security-alerts/cpujul2023.html
|
| json-c |
CVE-2020-12762 |
MEDIUM |
0.11-4.el7_0 |
|
https://access.redhat.com/errata/RHSA-2023:6431
https://access.redhat.com/security/cve/CVE-2020-12762
https://bugzilla.redhat.com/1835253
https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12762
https://errata.almalinux.org/9/ALSA-2023-6431.html
https://github.com/json-c/json-c/pull/592
https://github.com/rsyslog/libfastjson/issues/161
https://linux.oracle.com/cve/CVE-2020-12762.html
https://linux.oracle.com/errata/ELSA-2023-6976.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00034.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00031.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/
https://nvd.nist.gov/vuln/detail/CVE-2020-12762
https://security.gentoo.org/glsa/202006-13
https://security.netapp.com/advisory/ntap-20210521-0001/
https://ubuntu.com/security/notices/USN-4360-1
https://ubuntu.com/security/notices/USN-4360-4
https://usn.ubuntu.com/4360-1/
https://usn.ubuntu.com/4360-4/
https://www.cve.org/CVERecord?id=CVE-2020-12762
https://www.debian.org/security/2020/dsa-4741
|
| kernel-headers |
CVE-2016-8666 |
HIGH |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fac8e0f579695a3ecbc4d3cac369139d7f819971
http://rhn.redhat.com/errata/RHSA-2016-2047.html
http://rhn.redhat.com/errata/RHSA-2016-2107.html
http://rhn.redhat.com/errata/RHSA-2016-2110.html
http://rhn.redhat.com/errata/RHSA-2017-0004.html
http://www.openwall.com/lists/oss-security/2016/10/13/11
http://www.openwall.com/lists/oss-security/2016/10/14/3
http://www.securityfocus.com/bid/93562
https://access.redhat.com/errata/RHSA-2017:0372
https://access.redhat.com/security/cve/CVE-2016-8666
https://bto.bluecoat.com/security-advisory/sa134
https://bugzilla.redhat.com/show_bug.cgi?id=1384991
https://bugzilla.suse.com/show_bug.cgi?id=1001486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8666
https://github.com/torvalds/linux/commit/fac8e0f579695a3ecbc4d3cac369139d7f819971
https://linux.oracle.com/cve/CVE-2016-8666.html
https://linux.oracle.com/errata/ELSA-2017-3508.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8666
https://www.cve.org/CVERecord?id=CVE-2016-8666
|
| kernel-headers |
CVE-2017-1000112 |
HIGH |
3.10.0-1160.108.1.el7 |
|
http://seclists.org/oss-sec/2017/q3/277
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100262
http://www.securitytracker.com/id/1039162
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2017:3200
https://access.redhat.com/errata/RHSA-2019:1931
https://access.redhat.com/errata/RHSA-2019:1932
https://access.redhat.com/errata/RHSA-2019:4159
https://access.redhat.com/security/cve/CVE-2017-1000112
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=85f1bd9a7b5a79d5baa8bf44af19658f7bf77bfa
https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112
https://linux.oracle.com/cve/CVE-2017-1000112.html
https://linux.oracle.com/errata/ELSA-2017-3631.html
https://nvd.nist.gov/vuln/detail/CVE-2017-1000112
https://ubuntu.com/security/notices/USN-3384-1
https://ubuntu.com/security/notices/USN-3384-2
https://ubuntu.com/security/notices/USN-3385-1
https://ubuntu.com/security/notices/USN-3385-2
https://ubuntu.com/security/notices/USN-3386-1
https://ubuntu.com/security/notices/USN-3386-2
https://www.cve.org/CVERecord?id=CVE-2017-1000112
https://www.exploit-db.com/exploits/45147/
|
| kernel-headers |
CVE-2017-1000251 |
HIGH |
3.10.0-1160.108.1.el7 |
|
http://nvidia.custhelp.com/app/answers/detail/a_id/4561
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100809
http://www.securitytracker.com/id/1039373
https://access.redhat.com/blogs/product-security/posts/blueborne
https://access.redhat.com/errata/RHSA-2017:2679
https://access.redhat.com/errata/RHSA-2017:2680
https://access.redhat.com/errata/RHSA-2017:2681
https://access.redhat.com/errata/RHSA-2017:2682
https://access.redhat.com/errata/RHSA-2017:2683
https://access.redhat.com/errata/RHSA-2017:2704
https://access.redhat.com/errata/RHSA-2017:2705
https://access.redhat.com/errata/RHSA-2017:2706
https://access.redhat.com/errata/RHSA-2017:2707
https://access.redhat.com/errata/RHSA-2017:2731
https://access.redhat.com/errata/RHSA-2017:2732
https://access.redhat.com/security/cve/CVE-2017-1000251
https://access.redhat.com/security/vulnerabilities/blueborne
https://access.redhat.com/solutions/3177231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251
https://github.com/torvalds/linux/commit/f2fcfcd670257236ebf2088bbdf26f6a8ef459fe
https://linux.oracle.com/cve/CVE-2017-1000251.html
https://linux.oracle.com/errata/ELSA-2017-3622.html
https://nvd.nist.gov/vuln/detail/CVE-2017-1000251
https://ubuntu.com/security/notices/USN-3419-1
https://ubuntu.com/security/notices/USN-3419-2
https://ubuntu.com/security/notices/USN-3420-1
https://ubuntu.com/security/notices/USN-3420-2
https://ubuntu.com/security/notices/USN-3422-1
https://ubuntu.com/security/notices/USN-3422-2
https://ubuntu.com/security/notices/USN-3423-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BlueBorne
https://www.armis.com/blueborne
https://www.armis.com/blueborne/
https://www.cve.org/CVERecord?id=CVE-2017-1000251
https://www.exploit-db.com/exploits/42762/
https://www.kb.cert.org/vuls/id/240311
https://www.synology.com/support/security/Synology_SA_17_52_BlueBorne
|
| kernel-headers |
CVE-2017-15649 |
HIGH |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e
http://patchwork.ozlabs.org/patch/813945/
http://patchwork.ozlabs.org/patch/818726/
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6
http://www.securityfocus.com/bid/101573
https://access.redhat.com/errata/RHSA-2018:0151
https://access.redhat.com/errata/RHSA-2018:0152
https://access.redhat.com/errata/RHSA-2018:0181
https://access.redhat.com/security/cve/CVE-2017-15649
https://blogs.securiteam.com/index.php/archives/3484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15649
https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110
https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e
https://linux.oracle.com/cve/CVE-2017-15649.html
https://linux.oracle.com/errata/ELSA-2018-0151.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-15649
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-15649
|
| kernel-headers |
CVE-2017-7533 |
HIGH |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=49d31c2f389acfe83417083e1208422b4091cd9e
http://openwall.com/lists/oss-security/2017/08/03/2
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.openwall.com/lists/oss-security/2019/06/27/7
http://www.openwall.com/lists/oss-security/2019/06/28/1
http://www.openwall.com/lists/oss-security/2019/06/28/2
http://www.securityfocus.com/bid/100123
http://www.securitytracker.com/id/1039075
https://access.redhat.com/errata/RHSA-2017:2473
https://access.redhat.com/errata/RHSA-2017:2585
https://access.redhat.com/errata/RHSA-2017:2669
https://access.redhat.com/errata/RHSA-2017:2770
https://access.redhat.com/errata/RHSA-2017:2869
https://access.redhat.com/security/cve/CVE-2017-7533
https://bugzilla.redhat.com/show_bug.cgi?id=1468283
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533
https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e
https://linux.oracle.com/cve/CVE-2017-7533.html
https://linux.oracle.com/errata/ELSA-2017-3605.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7533
https://patchwork.kernel.org/patch/9755753/
https://patchwork.kernel.org/patch/9755757/
https://source.android.com/security/bulletin/2017-12-01
https://ubuntu.com/security/notices/USN-3377-1
https://ubuntu.com/security/notices/USN-3377-2
https://ubuntu.com/security/notices/USN-3378-1
https://ubuntu.com/security/notices/USN-3378-2
https://www.cve.org/CVERecord?id=CVE-2017-7533
https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1408967.html
|
| kernel-headers |
CVE-2017-8797 |
HIGH |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b550a32e60a4941994b437a8d662432a486235a5
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f961e3f2acae94b727380c0b74e2d3954d0edf79
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3
http://www.openwall.com/lists/oss-security/2017/06/27/5
http://www.securityfocus.com/bid/99298
http://www.securitytracker.com/id/1038790
https://access.redhat.com/errata/RHSA-2017:1842
https://access.redhat.com/errata/RHSA-2017:2077
https://access.redhat.com/errata/RHSA-2017:2437
https://access.redhat.com/errata/RHSA-2017:2669
https://access.redhat.com/security/cve/CVE-2017-8797
https://bugzilla.redhat.com/show_bug.cgi?id=1466329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797
https://github.com/torvalds/linux/commit/b550a32e60a4941994b437a8d662432a486235a5
https://github.com/torvalds/linux/commit/f961e3f2acae94b727380c0b74e2d3954d0edf79
https://linux.oracle.com/cve/CVE-2017-8797.html
https://linux.oracle.com/errata/ELSA-2017-1842.html
https://nvd.nist.gov/vuln/detail/CVE-2017-8797
https://www.cve.org/CVERecord?id=CVE-2017-8797
|
| kernel-headers |
CVE-2018-20976 |
HIGH |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/errata/RHSA-2020:0178
https://access.redhat.com/errata/RHSA-2020:0543
https://access.redhat.com/errata/RHSA-2020:0592
https://access.redhat.com/errata/RHSA-2020:0609
https://access.redhat.com/errata/RHSA-2020:0661
https://access.redhat.com/security/cve/CVE-2018-20976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20976
https://git.kernel.org/linus/c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20976
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20190905-0002/
https://support.f5.com/csp/article/K10269585?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4144-1
https://ubuntu.com/security/notices/USN-4145-1
https://usn.ubuntu.com/4144-1/
https://usn.ubuntu.com/4145-1/
https://www.cve.org/CVERecord?id=CVE-2018-20976
|
| kernel-headers |
CVE-2020-8834 |
HIGH |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
https://access.redhat.com/security/cve/CVE-2020-8834
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1867717
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8834
https://nvd.nist.gov/vuln/detail/CVE-2020-8834
https://ubuntu.com/security/notices/USN-4318-1
https://usn.ubuntu.com/4318-1/
https://usn.ubuntu.com/usn/usn-4318-1
https://www.cve.org/CVERecord?id=CVE-2020-8834
https://www.openwall.com/lists/oss-security/2020/04/06/2
|
| kernel-headers |
CVE-2021-3715 |
HIGH |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-3715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715
https://git.kernel.org/linus/ef299cc3fa1a9e1288665a9fdc8bff55629fd359 (5.6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359
https://linux.oracle.com/cve/CVE-2021-3715.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3715
https://www.cve.org/CVERecord?id=CVE-2021-3715
https://www.openwall.com/lists/oss-security/2021/09/07/1
|
| kernel-headers |
CVE-2022-2639 |
HIGH |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2022-2639
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://errata.rockylinux.org/RLSA-2022:7683
https://git.kernel.org/linus/cefa91b2332d7009bc0be5d951d6cbbf349f90f8 (5.18-rc4)
https://github.com/torvalds/linux/commit/cefa91b2332d7009bc0be5d951d6cbbf349f90f8
https://linux.oracle.com/cve/CVE-2022-2639.html
https://linux.oracle.com/errata/ELSA-2022-8267.html
https://nvd.nist.gov/vuln/detail/CVE-2022-2639
https://ubuntu.com/security/notices/USN-5650-1
https://www.cve.org/CVERecord?id=CVE-2022-2639
|
| kernel-headers |
CVE-2022-42896 |
HIGH |
3.10.0-1160.108.1.el7 |
3.10.0-1160.114.2.el7 |
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-42896
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/show_bug.cgi?id=2147364
https://bugzilla.redhat.com/show_bug.cgi?id=2181847
https://bugzilla.redhat.com/show_bug.cgi?id=2187439
https://bugzilla.redhat.com/show_bug.cgi?id=2188396
https://bugzilla.redhat.com/show_bug.cgi?id=2188470
https://bugzilla.redhat.com/show_bug.cgi?id=2192589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2235
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://errata.rockylinux.org/RLSA-2023:4517
https://git.kernel.org/linus/711f8c3fb3db61897080468586b970c87c61d9e4
https://github.com/google/security-research/security/advisories/GHSA-pf87-6c9q-jvm4
https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4
https://kernel.dance/#711f8c3fb3db61897080468586b970c87c61d9e4
https://linux.oracle.com/cve/CVE-2022-42896.html
https://linux.oracle.com/errata/ELSA-2023-4517.html
https://nvd.nist.gov/vuln/detail/CVE-2022-42896
https://ubuntu.com/security/notices/USN-5780-1
https://ubuntu.com/security/notices/USN-5783-1
https://ubuntu.com/security/notices/USN-5794-1
https://ubuntu.com/security/notices/USN-5802-1
https://ubuntu.com/security/notices/USN-5803-1
https://ubuntu.com/security/notices/USN-5804-1
https://ubuntu.com/security/notices/USN-5804-2
https://ubuntu.com/security/notices/USN-5808-1
https://ubuntu.com/security/notices/USN-5809-1
https://ubuntu.com/security/notices/USN-5813-1
https://ubuntu.com/security/notices/USN-5814-1
https://ubuntu.com/security/notices/USN-5829-1
https://ubuntu.com/security/notices/USN-5830-1
https://ubuntu.com/security/notices/USN-5831-1
https://ubuntu.com/security/notices/USN-5832-1
https://ubuntu.com/security/notices/USN-5860-1
https://ubuntu.com/security/notices/USN-5861-1
https://ubuntu.com/security/notices/USN-5863-1
https://ubuntu.com/security/notices/USN-5875-1
https://ubuntu.com/security/notices/USN-5877-1
https://ubuntu.com/security/notices/USN-5879-1
https://ubuntu.com/security/notices/USN-5914-1
https://ubuntu.com/security/notices/USN-5918-1
https://www.cve.org/CVERecord?id=CVE-2022-42896
|
| kernel-headers |
CVE-2023-1281 |
HIGH |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2023/04/11/3
https://access.redhat.com/errata/RHSA-2023:4541
https://access.redhat.com/security/cve/CVE-2023-1281
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2181847
https://bugzilla.redhat.com/2187439
https://bugzilla.redhat.com/2188396
https://bugzilla.redhat.com/2188470
https://bugzilla.redhat.com/2192589
https://bugzilla.redhat.com/show_bug.cgi?id=2147364
https://bugzilla.redhat.com/show_bug.cgi?id=2181847
https://bugzilla.redhat.com/show_bug.cgi?id=2187439
https://bugzilla.redhat.com/show_bug.cgi?id=2188396
https://bugzilla.redhat.com/show_bug.cgi?id=2188470
https://bugzilla.redhat.com/show_bug.cgi?id=2192589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2235
https://errata.almalinux.org/8/ALSA-2023-4541.html
https://errata.rockylinux.org/RLSA-2023:4517
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2
https://kernel.dance/#ee059170b1f7e94e55fa6cadee544e176a6e59c2
https://linux.oracle.com/cve/CVE-2023-1281.html
https://linux.oracle.com/errata/ELSA-2023-4517.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2023-1281
https://security.netapp.com/advisory/ntap-20230427-0004/
https://ubuntu.com/security/notices/USN-5977-1
https://ubuntu.com/security/notices/USN-5978-1
https://ubuntu.com/security/notices/USN-6024-1
https://ubuntu.com/security/notices/USN-6025-1
https://ubuntu.com/security/notices/USN-6027-1
https://ubuntu.com/security/notices/USN-6029-1
https://ubuntu.com/security/notices/USN-6030-1
https://ubuntu.com/security/notices/USN-6031-1
https://ubuntu.com/security/notices/USN-6040-1
https://ubuntu.com/security/notices/USN-6057-1
https://ubuntu.com/security/notices/USN-6093-1
https://ubuntu.com/security/notices/USN-6134-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6256-1
https://www.cve.org/CVERecord?id=CVE-2023-1281
|
| kernel-headers |
CVE-2023-1829 |
HIGH |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:4541
https://access.redhat.com/security/cve/CVE-2023-1829
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2181847
https://bugzilla.redhat.com/2187439
https://bugzilla.redhat.com/2188396
https://bugzilla.redhat.com/2188470
https://bugzilla.redhat.com/2192589
https://bugzilla.redhat.com/show_bug.cgi?id=2147364
https://bugzilla.redhat.com/show_bug.cgi?id=2181847
https://bugzilla.redhat.com/show_bug.cgi?id=2187439
https://bugzilla.redhat.com/show_bug.cgi?id=2188396
https://bugzilla.redhat.com/show_bug.cgi?id=2188470
https://bugzilla.redhat.com/show_bug.cgi?id=2192589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2235
https://errata.almalinux.org/8/ALSA-2023-4541.html
https://errata.rockylinux.org/RLSA-2023:4517
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28
https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28
https://linux.oracle.com/cve/CVE-2023-1829.html
https://linux.oracle.com/errata/ELSA-2023-4517.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2023-1829
https://security.netapp.com/advisory/ntap-20230601-0001/
https://ubuntu.com/security/notices/USN-6033-1
https://ubuntu.com/security/notices/USN-6043-1
https://ubuntu.com/security/notices/USN-6044-1
https://ubuntu.com/security/notices/USN-6045-1
https://ubuntu.com/security/notices/USN-6047-1
https://ubuntu.com/security/notices/USN-6051-1
https://ubuntu.com/security/notices/USN-6052-1
https://ubuntu.com/security/notices/USN-6058-1
https://ubuntu.com/security/notices/USN-6069-1
https://ubuntu.com/security/notices/USN-6070-1
https://ubuntu.com/security/notices/USN-6071-1
https://ubuntu.com/security/notices/USN-6072-1
https://ubuntu.com/security/notices/USN-6093-1
https://ubuntu.com/security/notices/USN-6107-1
https://ubuntu.com/security/notices/USN-6133-1
https://ubuntu.com/security/notices/USN-6134-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6256-1
https://www.cve.org/CVERecord?id=CVE-2023-1829
https://www.openwall.com/lists/oss-security/2023/04/11/3
|
| kernel-headers |
CVE-2023-45871 |
HIGH |
3.10.0-1160.108.1.el7 |
3.10.0-1160.114.2.el7 |
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/security/cve/CVE-2023-45871
https://bugzilla.redhat.com/2087568
https://bugzilla.redhat.com/2144379
https://bugzilla.redhat.com/2161310
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2187813
https://bugzilla.redhat.com/2187931
https://bugzilla.redhat.com/2231800
https://bugzilla.redhat.com/2237757
https://bugzilla.redhat.com/2244723
https://bugzilla.redhat.com/2245514
https://bugzilla.redhat.com/2246944
https://bugzilla.redhat.com/2246945
https://bugzilla.redhat.com/2253611
https://bugzilla.redhat.com/2253614
https://bugzilla.redhat.com/2253908
https://bugzilla.redhat.com/2254052
https://bugzilla.redhat.com/2254053
https://bugzilla.redhat.com/2254054
https://bugzilla.redhat.com/2255139
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871
https://errata.almalinux.org/8/ALSA-2024-0897.html
https://git.kernel.org/linus/bb5ed01cd2428cd25b1c88a3a9cba87055eb289f
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f
https://linux.oracle.com/cve/CVE-2023-45871.html
https://linux.oracle.com/errata/ELSA-2024-12169.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2023-45871
https://security.netapp.com/advisory/ntap-20231110-0001/
https://ubuntu.com/security/notices/USN-6494-1
https://ubuntu.com/security/notices/USN-6494-2
https://ubuntu.com/security/notices/USN-6495-1
https://ubuntu.com/security/notices/USN-6495-2
https://ubuntu.com/security/notices/USN-6496-1
https://ubuntu.com/security/notices/USN-6496-2
https://ubuntu.com/security/notices/USN-6502-1
https://ubuntu.com/security/notices/USN-6502-2
https://ubuntu.com/security/notices/USN-6502-3
https://ubuntu.com/security/notices/USN-6502-4
https://ubuntu.com/security/notices/USN-6516-1
https://ubuntu.com/security/notices/USN-6520-1
https://ubuntu.com/security/notices/USN-6532-1
https://www.cve.org/CVERecord?id=CVE-2023-45871
|
| kernel-headers |
CVE-2023-4622 |
HIGH |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://access.redhat.com/errata/RHSA-2024:0113
https://access.redhat.com/security/cve/CVE-2023-4622
https://bugzilla.redhat.com/2187773
https://bugzilla.redhat.com/2207625
https://bugzilla.redhat.com/2237760
https://bugzilla.redhat.com/2239843
https://bugzilla.redhat.com/2245663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4622
https://errata.almalinux.org/8/ALSA-2024-0113.html
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&id=790c2f9d15b594350ae9bca7b236f2b1859de02c
https://kernel.dance/790c2f9d15b594350ae9bca7b236f2b1859de02c
https://linux.oracle.com/cve/CVE-2023-4622.html
https://linux.oracle.com/errata/ELSA-2024-12094.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4622
https://ubuntu.com/security/notices/USN-6415-1
https://ubuntu.com/security/notices/USN-6439-1
https://ubuntu.com/security/notices/USN-6439-2
https://ubuntu.com/security/notices/USN-6440-1
https://ubuntu.com/security/notices/USN-6440-2
https://ubuntu.com/security/notices/USN-6440-3
https://ubuntu.com/security/notices/USN-6441-1
https://ubuntu.com/security/notices/USN-6441-2
https://ubuntu.com/security/notices/USN-6441-3
https://ubuntu.com/security/notices/USN-6442-1
https://ubuntu.com/security/notices/USN-6444-1
https://ubuntu.com/security/notices/USN-6444-2
https://ubuntu.com/security/notices/USN-6445-1
https://ubuntu.com/security/notices/USN-6445-2
https://ubuntu.com/security/notices/USN-6446-1
https://ubuntu.com/security/notices/USN-6446-2
https://ubuntu.com/security/notices/USN-6446-3
https://ubuntu.com/security/notices/USN-6466-1
https://www.cve.org/CVERecord?id=CVE-2023-4622
https://www.debian.org/security/2023/dsa-5492
|
| kernel-headers |
CVE-2023-4623 |
HIGH |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/security/cve/CVE-2023-4623
https://bugzilla.redhat.com/2087568
https://bugzilla.redhat.com/2144379
https://bugzilla.redhat.com/2161310
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2187813
https://bugzilla.redhat.com/2187931
https://bugzilla.redhat.com/2231800
https://bugzilla.redhat.com/2237757
https://bugzilla.redhat.com/2244723
https://bugzilla.redhat.com/2245514
https://bugzilla.redhat.com/2246944
https://bugzilla.redhat.com/2246945
https://bugzilla.redhat.com/2253611
https://bugzilla.redhat.com/2253614
https://bugzilla.redhat.com/2253908
https://bugzilla.redhat.com/2254052
https://bugzilla.redhat.com/2254053
https://bugzilla.redhat.com/2254054
https://bugzilla.redhat.com/2255139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623
https://errata.almalinux.org/8/ALSA-2024-0897.html
https://git.kernel.org/linus/b3d26c5702c7d6c45456326e56d2ccf3f103e60f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f
https://kernel.dance/b3d26c5702c7d6c45456326e56d2ccf3f103e60f
https://linux.oracle.com/cve/CVE-2023-4623.html
https://linux.oracle.com/errata/ELSA-2024-12187.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4623
https://ubuntu.com/security/notices/USN-6415-1
https://ubuntu.com/security/notices/USN-6439-1
https://ubuntu.com/security/notices/USN-6439-2
https://ubuntu.com/security/notices/USN-6440-1
https://ubuntu.com/security/notices/USN-6440-2
https://ubuntu.com/security/notices/USN-6440-3
https://ubuntu.com/security/notices/USN-6441-1
https://ubuntu.com/security/notices/USN-6441-2
https://ubuntu.com/security/notices/USN-6441-3
https://ubuntu.com/security/notices/USN-6442-1
https://ubuntu.com/security/notices/USN-6444-1
https://ubuntu.com/security/notices/USN-6444-2
https://ubuntu.com/security/notices/USN-6445-1
https://ubuntu.com/security/notices/USN-6445-2
https://ubuntu.com/security/notices/USN-6446-1
https://ubuntu.com/security/notices/USN-6446-2
https://ubuntu.com/security/notices/USN-6446-3
https://ubuntu.com/security/notices/USN-6460-1
https://ubuntu.com/security/notices/USN-6466-1
https://www.cve.org/CVERecord?id=CVE-2023-4623
|
| kernel-headers |
CVE-2023-4921 |
HIGH |
3.10.0-1160.108.1.el7 |
3.10.0-1160.114.2.el7 |
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/security/cve/CVE-2023-4921
https://bugzilla.redhat.com/2087568
https://bugzilla.redhat.com/2144379
https://bugzilla.redhat.com/2161310
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2187813
https://bugzilla.redhat.com/2187931
https://bugzilla.redhat.com/2231800
https://bugzilla.redhat.com/2237757
https://bugzilla.redhat.com/2244723
https://bugzilla.redhat.com/2245514
https://bugzilla.redhat.com/2246944
https://bugzilla.redhat.com/2246945
https://bugzilla.redhat.com/2253611
https://bugzilla.redhat.com/2253614
https://bugzilla.redhat.com/2253908
https://bugzilla.redhat.com/2254052
https://bugzilla.redhat.com/2254053
https://bugzilla.redhat.com/2254054
https://bugzilla.redhat.com/2255139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4921
https://errata.almalinux.org/8/ALSA-2024-0897.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8
https://github.com/torvalds/linux/commit/8fc134fee27f2263988ae38920bc03da416b03d8
https://kernel.dance/8fc134fee27f2263988ae38920bc03da416b03d8
https://linux.oracle.com/cve/CVE-2023-4921.html
https://linux.oracle.com/errata/ELSA-2024-12169.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/all/20230901162237.11525-1-jhs@mojatatu.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-4921
https://ubuntu.com/security/notices/USN-6439-1
https://ubuntu.com/security/notices/USN-6439-2
https://ubuntu.com/security/notices/USN-6440-1
https://ubuntu.com/security/notices/USN-6440-2
https://ubuntu.com/security/notices/USN-6440-3
https://ubuntu.com/security/notices/USN-6441-1
https://ubuntu.com/security/notices/USN-6441-2
https://ubuntu.com/security/notices/USN-6441-3
https://ubuntu.com/security/notices/USN-6442-1
https://ubuntu.com/security/notices/USN-6444-1
https://ubuntu.com/security/notices/USN-6444-2
https://ubuntu.com/security/notices/USN-6445-1
https://ubuntu.com/security/notices/USN-6445-2
https://ubuntu.com/security/notices/USN-6446-1
https://ubuntu.com/security/notices/USN-6446-2
https://ubuntu.com/security/notices/USN-6446-3
https://ubuntu.com/security/notices/USN-6454-1
https://ubuntu.com/security/notices/USN-6454-2
https://ubuntu.com/security/notices/USN-6454-3
https://ubuntu.com/security/notices/USN-6454-4
https://ubuntu.com/security/notices/USN-6461-1
https://ubuntu.com/security/notices/USN-6466-1
https://ubuntu.com/security/notices/USN-6479-1
https://www.cve.org/CVERecord?id=CVE-2023-4921
|
| kernel-headers |
CVE-2023-52449 |
HIGH |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52449
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52449
https://git.kernel.org/stable/c/001a3f59d8c914ef8273461d4bf495df384cc5f8
https://git.kernel.org/stable/c/1bf4fe14e97cda621522eb2f28b0a4e87c5b0745
https://git.kernel.org/stable/c/5389407bba1eab1266c6d83e226fb0840cb98dd5
https://git.kernel.org/stable/c/a43bdc376deab5fff1ceb93dca55bcab8dbdc1d6
https://git.kernel.org/stable/c/aeba358bcc8ffddf9b4a9bd0e5ec9eb338d46022
https://git.kernel.org/stable/c/b36aaa64d58aaa2f2cbc8275e89bae76a2b6c3dc
https://git.kernel.org/stable/c/cfd7c9d260dc0a3baaea05a122a19ab91e193c65
https://git.kernel.org/stable/c/d8ac2537763b54d278b80b2b080e1652523c7d4c
https://lore.kernel.org/linux-cve-announce/2024022256-CVE-2023-52449-5a7e@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52449
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52449
|
| kernel-headers |
CVE-2012-4542 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://marc.info/?l=linux-kernel&m=135903967015813&w=2
http://marc.info/?l=linux-kernel&m=135904012416042&w=2
http://rhn.redhat.com/errata/RHSA-2013-0496.html
http://rhn.redhat.com/errata/RHSA-2013-0579.html
http://rhn.redhat.com/errata/RHSA-2013-0882.html
http://rhn.redhat.com/errata/RHSA-2013-0928.html
https://access.redhat.com/security/cve/CVE-2012-4542
https://bugzilla.redhat.com/show_bug.cgi?id=875360
https://linux.oracle.com/cve/CVE-2012-4542.html
https://linux.oracle.com/errata/ELSA-2013-2534.html
https://nvd.nist.gov/vuln/detail/CVE-2012-4542
https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8
https://www.cve.org/CVERecord?id=CVE-2012-4542
|
| kernel-headers |
CVE-2013-4270 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2433c8f094a008895e66f25bd1773cdb01c91d01
http://rhn.redhat.com/errata/RHSA-2014-0100.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5
http://www.ubuntu.com/usn/USN-2049-1
https://access.redhat.com/security/cve/CVE-2013-4270
https://bugzilla.redhat.com/show_bug.cgi?id=1027752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4270
https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01
https://linux.oracle.com/cve/CVE-2013-4270.html
https://linux.oracle.com/errata/ELSA-2014-3002.html
https://nvd.nist.gov/vuln/detail/CVE-2013-4270
https://ubuntu.com/security/notices/USN-2020-1
https://ubuntu.com/security/notices/USN-2023-1
https://ubuntu.com/security/notices/USN-2049-1
https://www.cve.org/CVERecord?id=CVE-2013-4270
|
| kernel-headers |
CVE-2013-4350 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95ee62083cb6453e056562d91f597552021e6ae7
http://rhn.redhat.com/errata/RHSA-2013-1490.html
http://www.openwall.com/lists/oss-security/2013/09/13
http://www.openwall.com/lists/oss-security/2013/09/13/3
http://www.ubuntu.com/usn/USN-2019-1
http://www.ubuntu.com/usn/USN-2021-1
http://www.ubuntu.com/usn/USN-2022-1
http://www.ubuntu.com/usn/USN-2024-1
http://www.ubuntu.com/usn/USN-2038-1
http://www.ubuntu.com/usn/USN-2039-1
http://www.ubuntu.com/usn/USN-2041-1
http://www.ubuntu.com/usn/USN-2045-1
http://www.ubuntu.com/usn/USN-2049-1
http://www.ubuntu.com/usn/USN-2050-1
https://access.redhat.com/security/cve/CVE-2013-4350
https://bugzilla.redhat.com/show_bug.cgi?id=1007872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4350
https://github.com/torvalds/linux/commit/95ee62083cb6453e056562d91f597552021e6ae7
https://linux.oracle.com/cve/CVE-2013-4350.html
https://linux.oracle.com/errata/ELSA-2014-3002.html
https://nvd.nist.gov/vuln/detail/CVE-2013-4350
https://ubuntu.com/security/notices/USN-2019-1
https://ubuntu.com/security/notices/USN-2021-1
https://ubuntu.com/security/notices/USN-2022-1
https://ubuntu.com/security/notices/USN-2024-1
https://ubuntu.com/security/notices/USN-2038-1
https://ubuntu.com/security/notices/USN-2039-1
https://ubuntu.com/security/notices/USN-2041-1
https://ubuntu.com/security/notices/USN-2045-1
https://ubuntu.com/security/notices/USN-2049-1
https://ubuntu.com/security/notices/USN-2050-1
https://www.cve.org/CVERecord?id=CVE-2013-4350
|
| kernel-headers |
CVE-2013-7446 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00037.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00042.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2015/dsa-3426
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3
http://www.openwall.com/lists/oss-security/2015/11/18/16
http://www.openwall.com/lists/oss-security/2015/11/18/9
http://www.securityfocus.com/bid/77638
http://www.securitytracker.com/id/1034557
http://www.spinics.net/lists/netdev/msg318826.html
http://www.ubuntu.com/usn/USN-2886-1
http://www.ubuntu.com/usn/USN-2887-1
http://www.ubuntu.com/usn/USN-2887-2
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2889-1
http://www.ubuntu.com/usn/USN-2889-2
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
https://access.redhat.com/security/cve/CVE-2013-7446
https://bugzilla.redhat.com/show_bug.cgi?id=1273845
https://bugzilla.redhat.com/show_bug.cgi?id=1282688
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446
https://forums.grsecurity.net/viewtopic.php?f=3&t=4150
https://github.com/torvalds/linux/commit/7d267278a9ece963d77eefec61630223fce08c6c
https://groups.google.com/forum/#!topic/syzkaller/3twDUI4Cpm8
https://groups.google.com/forum/#%21topic/syzkaller/3twDUI4Cpm8
https://linux.oracle.com/cve/CVE-2013-7446.html
https://linux.oracle.com/errata/ELSA-2017-3516.html
https://lkml.org/lkml/2013/10/14/424
https://lkml.org/lkml/2014/5/15/532
https://lkml.org/lkml/2015/9/13/195
https://nvd.nist.gov/vuln/detail/CVE-2013-7446
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2887-1
https://ubuntu.com/security/notices/USN-2887-2
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2889-1
https://ubuntu.com/security/notices/USN-2889-2
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
https://www.cve.org/CVERecord?id=CVE-2013-7446
|
| kernel-headers |
CVE-2014-2039 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d7f6690cedb83456edd41c9bd583783f0703bf0
http://linux.oracle.com/errata/ELSA-2014-0771.html
http://secunia.com/advisories/59262
http://secunia.com/advisories/59309
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.5
http://www.openwall.com/lists/oss-security/2014/02/20/14
http://www.securityfocus.com/bid/65700
https://access.redhat.com/security/cve/CVE-2014-2039
https://bugzilla.redhat.com/show_bug.cgi?id=1067558
https://github.com/torvalds/linux/commit/8d7f6690cedb83456edd41c9bd583783f0703bf0
https://linux.oracle.com/cve/CVE-2014-2039.html
https://linux.oracle.com/errata/ELSA-2014-0771.html
https://nvd.nist.gov/vuln/detail/CVE-2014-2039
https://www.cve.org/CVERecord?id=CVE-2014-2039
|
| kernel-headers |
CVE-2014-9710 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html
http://www.openwall.com/lists/oss-security/2015/03/24/11
http://www.securitytracker.com/id/1032418
https://access.redhat.com/security/cve/CVE-2014-9710
https://bugzilla.redhat.com/show_bug.cgi?id=1205079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9710
https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339
https://linux.oracle.com/cve/CVE-2014-9710.html
https://linux.oracle.com/errata/ELSA-2017-3597.html
https://nvd.nist.gov/vuln/detail/CVE-2014-9710
https://ubuntu.com/security/notices/USN-2615-1
https://ubuntu.com/security/notices/USN-2616-1
https://ubuntu.com/security/notices/USN-2662-1
https://ubuntu.com/security/notices/USN-2663-1
https://www.cve.org/CVERecord?id=CVE-2014-9710
|
| kernel-headers |
CVE-2014-9728 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1d47b262952a45aae62bd49cfaf33dd76c11a2c
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
http://www.openwall.com/lists/oss-security/2015/06/02/7
http://www.securityfocus.com/bid/74964
https://access.redhat.com/security/cve/CVE-2014-9728
https://bugzilla.redhat.com/show_bug.cgi?id=1228229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9728
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1d47b262952a45aae62bd49cfaf33dd76c11a2c (v3.19-rc3)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 (v3.19-rc3)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9 (v3.19-rc3)
https://github.com/torvalds/linux/commit/a1d47b262952a45aae62bd49cfaf33dd76c11a2c
https://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9
https://linux.oracle.com/cve/CVE-2014-9728.html
https://linux.oracle.com/errata/ELSA-2019-4316.html
https://nvd.nist.gov/vuln/detail/CVE-2014-9728
https://ubuntu.com/security/notices/USN-2517-1
https://ubuntu.com/security/notices/USN-2518-1
https://ubuntu.com/security/notices/USN-2541-1
https://ubuntu.com/security/notices/USN-2542-1
https://ubuntu.com/security/notices/USN-2543-1
https://ubuntu.com/security/notices/USN-2544-1
https://www.cve.org/CVERecord?id=CVE-2014-9728
|
| kernel-headers |
CVE-2014-9729 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
http://www.openwall.com/lists/oss-security/2015/06/02/7
http://www.securityfocus.com/bid/74964
https://access.redhat.com/security/cve/CVE-2014-9729
https://bugzilla.redhat.com/show_bug.cgi?id=1228229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9729
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 (v3.19-rc3)
https://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
https://nvd.nist.gov/vuln/detail/CVE-2014-9729
https://ubuntu.com/security/notices/USN-2517-1
https://ubuntu.com/security/notices/USN-2518-1
https://ubuntu.com/security/notices/USN-2541-1
https://ubuntu.com/security/notices/USN-2542-1
https://ubuntu.com/security/notices/USN-2543-1
https://ubuntu.com/security/notices/USN-2544-1
https://www.cve.org/CVERecord?id=CVE-2014-9729
|
| kernel-headers |
CVE-2014-9730 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
http://www.openwall.com/lists/oss-security/2015/06/02/7
http://www.securityfocus.com/bid/74964
https://access.redhat.com/security/cve/CVE-2014-9730
https://bugzilla.redhat.com/show_bug.cgi?id=1228229
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9730
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9 (v3.19-rc3)
https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9
https://nvd.nist.gov/vuln/detail/CVE-2014-9730
https://ubuntu.com/security/notices/USN-2517-1
https://ubuntu.com/security/notices/USN-2518-1
https://ubuntu.com/security/notices/USN-2541-1
https://ubuntu.com/security/notices/USN-2542-1
https://ubuntu.com/security/notices/USN-2543-1
https://ubuntu.com/security/notices/USN-2544-1
https://www.cve.org/CVERecord?id=CVE-2014-9730
|
| kernel-headers |
CVE-2015-4167 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23b133bdc452aa441fcb9b82cbf6dd05cfd342d0
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.debian.org/security/2015/dsa-3290
http://www.debian.org/security/2015/dsa-3313
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.1
http://www.openwall.com/lists/oss-security/2015/06/02/6
http://www.securityfocus.com/bid/74963
http://www.securitytracker.com/id/1033187
http://www.ubuntu.com/usn/USN-2631-1
http://www.ubuntu.com/usn/USN-2632-1
https://access.redhat.com/security/cve/CVE-2015-4167
https://bugzilla.redhat.com/show_bug.cgi?id=1228204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4167
https://github.com/torvalds/linux/commit/23b133bdc452aa441fcb9b82cbf6dd05cfd342d0
https://linux.oracle.com/cve/CVE-2015-4167.html
https://linux.oracle.com/errata/ELSA-2017-3597.html
https://nvd.nist.gov/vuln/detail/CVE-2015-4167
https://ubuntu.com/security/notices/USN-2631-1
https://ubuntu.com/security/notices/USN-2632-1
https://ubuntu.com/security/notices/USN-2662-1
https://ubuntu.com/security/notices/USN-2663-1
https://ubuntu.com/security/notices/USN-2664-1
https://ubuntu.com/security/notices/USN-2666-1
https://www.cve.org/CVERecord?id=CVE-2015-4167
|
| kernel-headers |
CVE-2015-4177 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cd4a40174b71acd021877341684d8bb1dc8ea4ae
http://openwall.com/lists/oss-security/2015/05/29/10
http://openwall.com/lists/oss-security/2015/05/29/5
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.5
http://www.openwall.com/lists/oss-security/2015/06/04/5
https://access.redhat.com/security/cve/CVE-2015-4177
https://bugzilla.redhat.com/show_bug.cgi?id=1248486
https://github.com/torvalds/linux/commit/cd4a40174b71acd021877341684d8bb1dc8ea4ae
https://nvd.nist.gov/vuln/detail/CVE-2015-4177
https://www.cve.org/CVERecord?id=CVE-2015-4177
|
| kernel-headers |
CVE-2015-4692 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160829.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161144.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://www.debian.org/security/2015/dsa-3329
http://www.openwall.com/lists/oss-security/2015/06/10/6
http://www.openwall.com/lists/oss-security/2015/06/21/1
http://www.securityfocus.com/bid/75142
http://www.securitytracker.com/id/1032798
http://www.ubuntu.com/usn/USN-2680-1
http://www.ubuntu.com/usn/USN-2681-1
http://www.ubuntu.com/usn/USN-2682-1
http://www.ubuntu.com/usn/USN-2683-1
http://www.ubuntu.com/usn/USN-2684-1
https://access.redhat.com/security/cve/CVE-2015-4692
https://bugzilla.redhat.com/show_bug.cgi?id=1230770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4692
https://github.com/torvalds/linux/commit/ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009
https://lkml.org/lkml/2015/6/4/163
https://nvd.nist.gov/vuln/detail/CVE-2015-4692
https://ubuntu.com/security/notices/USN-2680-1
https://ubuntu.com/security/notices/USN-2681-1
https://ubuntu.com/security/notices/USN-2682-1
https://ubuntu.com/security/notices/USN-2683-1
https://ubuntu.com/security/notices/USN-2684-1
https://www.cve.org/CVERecord?id=CVE-2015-4692
|
| kernel-headers |
CVE-2015-5707 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html
http://www.debian.org/security/2015/dsa-3329
http://www.openwall.com/lists/oss-security/2015/08/01/6
http://www.securityfocus.com/bid/76145
http://www.securitytracker.com/id/1033521
http://www.ubuntu.com/usn/USN-2733-1
http://www.ubuntu.com/usn/USN-2734-1
http://www.ubuntu.com/usn/USN-2737-1
http://www.ubuntu.com/usn/USN-2738-1
http://www.ubuntu.com/usn/USN-2750-1
http://www.ubuntu.com/usn/USN-2759-1
http://www.ubuntu.com/usn/USN-2760-1
https://access.redhat.com/security/cve/CVE-2015-5707
https://bugzilla.redhat.com/show_bug.cgi?id=1250030
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5707
https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81
https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee
https://linux.oracle.com/cve/CVE-2015-5707.html
https://linux.oracle.com/errata/ELSA-2017-3535.html
https://nvd.nist.gov/vuln/detail/CVE-2015-5707
https://source.android.com/security/bulletin/2017-07-01
https://ubuntu.com/security/notices/USN-2733-1
https://ubuntu.com/security/notices/USN-2734-1
https://ubuntu.com/security/notices/USN-2737-1
https://ubuntu.com/security/notices/USN-2738-1
https://ubuntu.com/security/notices/USN-2750-1
https://ubuntu.com/security/notices/USN-2759-1
https://ubuntu.com/security/notices/USN-2760-1
https://www.cve.org/CVERecord?id=CVE-2015-5707
|
| kernel-headers |
CVE-2015-7513 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0185604c2d82c560dab2f2933a18f797e74ab5a8
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html
http://www.debian.org/security/2016/dsa-3434
http://www.openwall.com/lists/oss-security/2016/01/07/2
http://www.securityfocus.com/bid/79901
http://www.securitytracker.com/id/1034602
http://www.ubuntu.com/usn/USN-2886-1
http://www.ubuntu.com/usn/USN-2887-1
http://www.ubuntu.com/usn/USN-2887-2
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2889-1
http://www.ubuntu.com/usn/USN-2889-2
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
https://access.redhat.com/security/cve/CVE-2015-7513
https://bugzilla.redhat.com/show_bug.cgi?id=1284847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513
https://git.kernel.org/linus/0185604c2d82c560dab2f2933a18f797e74ab5a8 (v4.4-rc7)
https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8
https://nvd.nist.gov/vuln/detail/CVE-2015-7513
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2887-1
https://ubuntu.com/security/notices/USN-2887-2
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2889-1
https://ubuntu.com/security/notices/USN-2889-2
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
https://www.cve.org/CVERecord?id=CVE-2015-7513
|
| kernel-headers |
CVE-2015-7550 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b4a1b4f5047e4f54e194681125c74c0aa64d637d
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3434
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4
http://www.securityfocus.com/bid/79903
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
http://www.ubuntu.com/usn/USN-2911-1
http://www.ubuntu.com/usn/USN-2911-2
https://access.redhat.com/security/cve/CVE-2015-7550
https://bugzilla.redhat.com/show_bug.cgi?id=1291197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550
https://git.kernel.org/linus/b4a1b4f5047e4f54e194681125c74c0aa64d637d
https://github.com/torvalds/linux/commit/b4a1b4f5047e4f54e194681125c74c0aa64d637d
https://nvd.nist.gov/vuln/detail/CVE-2015-7550
https://security-tracker.debian.org/tracker/CVE-2015-7550
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
https://ubuntu.com/security/notices/USN-2907-1
https://ubuntu.com/security/notices/USN-2907-2
https://ubuntu.com/security/notices/USN-2910-1
https://ubuntu.com/security/notices/USN-2911-1
https://ubuntu.com/security/notices/USN-2911-2
https://www.cve.org/CVERecord?id=CVE-2015-7550
|
| kernel-headers |
CVE-2015-8953 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ab79efab0a0ba01a74df782eb7fa44b044dae8b5
http://seclists.org/oss-sec/2016/q3/371
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.6
http://www.openwall.com/lists/oss-security/2016/08/23/9
http://www.securityfocus.com/bid/92611
https://access.redhat.com/security/cve/CVE-2015-8953
https://bugzilla.redhat.com/show_bug.cgi?id=1367814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8953
https://github.com/torvalds/linux/commit/ab79efab0a0ba01a74df782eb7fa44b044dae8b5
https://nvd.nist.gov/vuln/detail/CVE-2015-8953
https://www.cve.org/CVERecord?id=CVE-2015-8953
|
| kernel-headers |
CVE-2016-0723 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://lkml.iu.edu/hypermail/linux/kernel/1511.3/03045.html
http://source.android.com/security/bulletin/2016-07-01.html
http://www.debian.org/security/2016/dsa-3448
http://www.debian.org/security/2016/dsa-3503
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/82950
http://www.securitytracker.com/id/1035695
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-0723
https://bugzilla.redhat.com/show_bug.cgi?id=1296253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0723
https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439
https://linux.oracle.com/cve/CVE-2016-0723.html
https://linux.oracle.com/errata/ELSA-2016-3596.html
https://nvd.nist.gov/vuln/detail/CVE-2016-0723
https://security-tracker.debian.org/tracker/CVE-2016-0723
https://support.f5.com/csp/article/K43650115
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://www.cve.org/CVERecord?id=CVE-2016-0723
|
| kernel-headers |
CVE-2016-0821 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8a5e5e02fc83aaf67053ab53b359af08c6c49aaf
http://source.android.com/security/bulletin/2016-03-01.html
http://www.debian.org/security/2016/dsa-3607
http://www.openwall.com/lists/oss-security/2015/05/02/6
http://www.securityfocus.com/bid/84260
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
https://access.redhat.com/security/cve/CVE-2016-0821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0821
https://github.com/torvalds/linux/commit/8a5e5e02fc83aaf67053ab53b359af08c6c49aaf
https://nvd.nist.gov/vuln/detail/CVE-2016-0821
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://www.cve.org/CVERecord?id=CVE-2016-0821
|
| kernel-headers |
CVE-2016-10044 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a
http://source.android.com/security/bulletin/2017-02-01.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7
http://www.securityfocus.com/bid/96122
http://www.securitytracker.com/id/1037798
https://access.redhat.com/security/cve/CVE-2016-10044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044
https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a
https://linux.oracle.com/cve/CVE-2016-10044.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10044
https://ubuntu.com/security/notices/USN-3422-1
https://ubuntu.com/security/notices/USN-3422-2
https://www.cve.org/CVERecord?id=CVE-2016-10044
|
| kernel-headers |
CVE-2016-2085 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=613317bd212c585c20796c10afe5daaa95d4b0a1
http://www.ubuntu.com/usn/USN-2946-1
http://www.ubuntu.com/usn/USN-2946-2
http://www.ubuntu.com/usn/USN-2947-1
http://www.ubuntu.com/usn/USN-2947-2
http://www.ubuntu.com/usn/USN-2947-3
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2949-1
https://access.redhat.com/security/cve/CVE-2016-2085
https://bugzilla.redhat.com/show_bug.cgi?id=1324867
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2085
https://github.com/torvalds/linux/commit/613317bd212c585c20796c10afe5daaa95d4b0a1
https://nvd.nist.gov/vuln/detail/CVE-2016-2085
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2085.html
https://security-tracker.debian.org/tracker/CVE-2016-2085
https://ubuntu.com/security/notices/USN-2946-1
https://ubuntu.com/security/notices/USN-2946-2
https://ubuntu.com/security/notices/USN-2947-1
https://ubuntu.com/security/notices/USN-2947-2
https://ubuntu.com/security/notices/USN-2947-3
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2949-1
https://www.cve.org/CVERecord?id=CVE-2016-2085
|
| kernel-headers |
CVE-2016-2546 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=af368027a49a751d6ff4ee9e3f9961f35bb4fede
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83384
http://www.securitytracker.com/id/1035301
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2546
https://bugzilla.redhat.com/show_bug.cgi?id=1311564
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546
https://github.com/torvalds/linux/commit/af368027a49a751d6ff4ee9e3f9961f35bb4fede
https://nvd.nist.gov/vuln/detail/CVE-2016-2546
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://www.cve.org/CVERecord?id=CVE-2016-2546
|
| kernel-headers |
CVE-2016-3157 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.debian.org/security/2016/dsa-3607
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.securityfocus.com/bid/84594
http://www.securitytracker.com/id/1035308
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://xenbits.xen.org/xsa/advisory-171.html
http://xenbits.xen.org/xsa/xsa171.patch
https://access.redhat.com/security/cve/CVE-2016-3157
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3157
https://linux.oracle.com/cve/CVE-2016-3157.html
https://linux.oracle.com/errata/ELSA-2016-3657.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3157
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://www.cve.org/CVERecord?id=CVE-2016-3157
|
| kernel-headers |
CVE-2016-4794 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://rhn.redhat.com/errata/RHSA-2016-2574.html
http://rhn.redhat.com/errata/RHSA-2016-2584.html
http://www.openwall.com/lists/oss-security/2016/05/12/6
http://www.securityfocus.com/bid/90625
http://www.ubuntu.com/usn/USN-3053-1
http://www.ubuntu.com/usn/USN-3054-1
http://www.ubuntu.com/usn/USN-3055-1
http://www.ubuntu.com/usn/USN-3056-1
http://www.ubuntu.com/usn/USN-3057-1
https://access.redhat.com/security/cve/CVE-2016-4794
https://bugzilla.redhat.com/show_bug.cgi?id=1335889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4794
https://linux.oracle.com/cve/CVE-2016-4794.html
https://linux.oracle.com/errata/ELSA-2016-3644.html
https://lkml.org/lkml/2016/4/17/125
https://nvd.nist.gov/vuln/detail/CVE-2016-4794
https://source.android.com/security/bulletin/2016-12-01.html
https://ubuntu.com/security/notices/USN-3053-1
https://ubuntu.com/security/notices/USN-3054-1
https://ubuntu.com/security/notices/USN-3055-1
https://ubuntu.com/security/notices/USN-3056-1
https://ubuntu.com/security/notices/USN-3057-1
https://www.cve.org/CVERecord?id=CVE-2016-4794
|
| kernel-headers |
CVE-2016-7911 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8ba8682107ee2ca3347354e018865d8e1967c5f4
http://source.android.com/security/bulletin/2016-11-01.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.6
http://www.securityfocus.com/bid/94135
https://access.redhat.com/security/cve/CVE-2016-7911
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7911
https://github.com/torvalds/linux/commit/8ba8682107ee2ca3347354e018865d8e1967c5f4
https://nvd.nist.gov/vuln/detail/CVE-2016-7911
https://ubuntu.com/security/notices/USN-3206-1
https://ubuntu.com/security/notices/USN-3207-1
https://ubuntu.com/security/notices/USN-3207-2
https://www.cve.org/CVERecord?id=CVE-2016-7911
|
| kernel-headers |
CVE-2017-1000111 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100267
http://www.securitytracker.com/id/1039132
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2017:3200
https://access.redhat.com/security/cve/CVE-2017-1000111
https://access.redhat.com/security/cve/cve-2017-1000111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=c27927e372f0785f3303e8fad94b85945e2c97b7
https://linux.oracle.com/cve/CVE-2017-1000111.html
https://linux.oracle.com/errata/ELSA-2017-3633.html
https://nvd.nist.gov/vuln/detail/CVE-2017-1000111
https://ubuntu.com/security/notices/USN-3384-1
https://ubuntu.com/security/notices/USN-3384-2
https://ubuntu.com/security/notices/USN-3385-1
https://ubuntu.com/security/notices/USN-3385-2
https://ubuntu.com/security/notices/USN-3386-1
https://ubuntu.com/security/notices/USN-3386-2
https://www.cve.org/CVERecord?id=CVE-2017-1000111
|
| kernel-headers |
CVE-2017-1000380 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ba3021b2c79b2fa9114f92790a99deb27a65b728
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d11662f4f798b50d8c8743f433842c3e40fe3378
http://www.debian.org/security/2017/dsa-3981
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.5
http://www.openwall.com/lists/oss-security/2017/06/12/2
http://www.securityfocus.com/bid/99121
https://access.redhat.com/errata/RHSA-2017:3295
https://access.redhat.com/errata/RHSA-2017:3315
https://access.redhat.com/errata/RHSA-2017:3322
https://access.redhat.com/security/cve/CVE-2017-1000380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380
https://github.com/torvalds/linux/commit/ba3021b2c79b2fa9114f92790a99deb27a65b728
https://github.com/torvalds/linux/commit/d11662f4f798b50d8c8743f433842c3e40fe3378
https://linux.oracle.com/cve/CVE-2017-1000380.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://nvd.nist.gov/vuln/detail/CVE-2017-1000380
https://source.android.com/security/bulletin/pixel/2017-12-01
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
https://www.cve.org/CVERecord?id=CVE-2017-1000380
|
| kernel-headers |
CVE-2017-11176 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.securityfocus.com/bid/99919
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2018:0169
https://access.redhat.com/errata/RHSA-2018:3822
https://access.redhat.com/security/cve/CVE-2017-11176
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1
https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2017-11176.html
https://linux.oracle.com/errata/ELSA-2018-0169.html
https://nvd.nist.gov/vuln/detail/CVE-2017-11176
https://ubuntu.com/security/notices/USN-3405-1
https://ubuntu.com/security/notices/USN-3405-2
https://ubuntu.com/security/notices/USN-3468-1
https://ubuntu.com/security/notices/USN-3468-2
https://ubuntu.com/security/notices/USN-3468-3
https://ubuntu.com/security/notices/USN-3470-1
https://ubuntu.com/security/notices/USN-3470-2
https://www.cve.org/CVERecord?id=CVE-2017-11176
https://www.exploit-db.com/exploits/45553/
|
| kernel-headers |
CVE-2017-11600 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://seclists.org/bugtraq/2017/Jul/30
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/99928
https://access.redhat.com/errata/RHSA-2018:1965
https://access.redhat.com/errata/RHSA-2018:2003
https://access.redhat.com/errata/RHSA-2019:1170
https://access.redhat.com/errata/RHSA-2019:1190
https://access.redhat.com/security/cve/CVE-2017-11600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/xfrm/xfrm_policy.c?id=7bab09631c2a303f87a7eb7e3d69e888673b9b7e
https://linux.oracle.com/cve/CVE-2017-11600.html
https://linux.oracle.com/errata/ELSA-2018-4172.html
https://nvd.nist.gov/vuln/detail/CVE-2017-11600
https://source.android.com/security/bulletin/pixel/2017-11-01
https://www.cve.org/CVERecord?id=CVE-2017-11600
|
| kernel-headers |
CVE-2017-13693 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/100502
https://access.redhat.com/security/cve/CVE-2017-13693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693
https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732
https://nvd.nist.gov/vuln/detail/CVE-2017-13693
https://patchwork.kernel.org/patch/9919053/
https://www.cve.org/CVERecord?id=CVE-2017-13693
|
| kernel-headers |
CVE-2017-13694 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/100500
https://access.redhat.com/security/cve/CVE-2017-13694
https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0
https://nvd.nist.gov/vuln/detail/CVE-2017-13694
https://patchwork.kernel.org/patch/9806085/
https://www.cve.org/CVERecord?id=CVE-2017-13694
|
| kernel-headers |
CVE-2017-13695 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/100497
https://access.redhat.com/security/cve/CVE-2017-13695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13695
https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5
https://linux.oracle.com/cve/CVE-2017-13695.html
https://linux.oracle.com/errata/ELSA-2018-4250.html
https://nvd.nist.gov/vuln/detail/CVE-2017-13695
https://patchwork.kernel.org/patch/9850567/
https://ubuntu.com/security/notices/USN-3696-1
https://ubuntu.com/security/notices/USN-3696-2
https://ubuntu.com/security/notices/USN-3762-1
https://ubuntu.com/security/notices/USN-3762-2
https://usn.ubuntu.com/3696-1/
https://usn.ubuntu.com/3696-2/
https://usn.ubuntu.com/3762-1/
https://usn.ubuntu.com/3762-2/
https://www.cve.org/CVERecord?id=CVE-2017-13695
|
| kernel-headers |
CVE-2017-14051 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/100571
https://access.redhat.com/security/cve/CVE-2017-14051
https://bugzilla.kernel.org/show_bug.cgi?id=194061
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14051
https://github.com/torvalds/linux/commit/e6f77540c067b48dee10f1e33678415bfcc89017
https://linux.oracle.com/cve/CVE-2017-14051.html
https://linux.oracle.com/errata/ELSA-2019-4317.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-14051
https://patchwork.kernel.org/patch/9929625/
https://ubuntu.com/security/notices/USN-3469-1
https://ubuntu.com/security/notices/USN-3469-2
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://www.cve.org/CVERecord?id=CVE-2017-14051
|
| kernel-headers |
CVE-2017-14106 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=499350a5a6e7512d9ed369ed63a4244b6536f4f8
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100878
http://www.securitytracker.com/id/1039549
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2017:3200
https://access.redhat.com/errata/RHSA-2018:2172
https://access.redhat.com/security/cve/CVE-2017-14106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=499350a5a6e7512d9ed369ed63a4244b6536f4f8
https://github.com/torvalds/linux/commit/499350a5a6e7512d9ed369ed63a4244b6536f4f8
https://linux.oracle.com/cve/CVE-2017-14106.html
https://linux.oracle.com/errata/ELSA-2018-4235.html
https://nvd.nist.gov/vuln/detail/CVE-2017-14106
https://ubuntu.com/security/notices/USN-3443-1
https://ubuntu.com/security/notices/USN-3443-2
https://ubuntu.com/security/notices/USN-3443-3
https://ubuntu.com/security/notices/USN-3444-1
https://ubuntu.com/security/notices/USN-3444-2
https://ubuntu.com/security/notices/USN-3445-1
https://ubuntu.com/security/notices/USN-3445-2
https://www.cve.org/CVERecord?id=CVE-2017-14106
https://www.mail-archive.com/netdev%40vger.kernel.org/msg186255.html
|
| kernel-headers |
CVE-2017-14489 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/101011
https://access.redhat.com/security/cve/CVE-2017-14489
https://bugzilla.redhat.com/show_bug.cgi?id=1490421
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489
https://git.kernel.org/pub/scm/linux/kernel/git/jejb/scsi.git/commit/drivers/scsi/scsi_transport_iscsi.c?h=fixes&id=c88f0e6b06f4092995688211a631bb436125d77b
https://linux.oracle.com/cve/CVE-2017-14489.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://nvd.nist.gov/vuln/detail/CVE-2017-14489
https://patchwork.kernel.org/patch/9923803/
https://ubuntu.com/security/notices/USN-3469-1
https://ubuntu.com/security/notices/USN-3469-2
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://www.cve.org/CVERecord?id=CVE-2017-14489
https://www.exploit-db.com/exploits/42932/
|
| kernel-headers |
CVE-2017-14497 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=edbd58be15a957f6a760c4a514cd475217eb97fd
http://seclists.org/oss-sec/2017/q3/476
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100871
http://www.securitytracker.com/id/1039371
http://www.securitytracker.com/id/1040106
https://access.redhat.com/security/cve/CVE-2017-14497
https://bugzilla.redhat.com/show_bug.cgi?id=1492593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14497
https://github.com/torvalds/linux/commit/edbd58be15a957f6a760c4a514cd475217eb97fd
https://marc.info/?l=linux-kernel&m=150394500728906&w=2
https://marc.info/?t=150394517700001&r=1&w=2
https://nvd.nist.gov/vuln/detail/CVE-2017-14497
https://source.android.com/security/bulletin/2018-01-01
https://www.cve.org/CVERecord?id=CVE-2017-14497
|
| kernel-headers |
CVE-2017-15128 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e3921471354244f70fe268586ff94a97a6dd4df
http://post-office.corp.redhat.com/archives/rhkernel-list/2017-October/msg09574.html
https://access.redhat.com/security/cve/CVE-2017-15128
https://bugzilla.redhat.com/show_bug.cgi?id=1525222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15128
https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df
https://linux.oracle.com/cve/CVE-2017-15128.html
https://linux.oracle.com/errata/ELSA-2019-4850.html
https://marc.info/?l=linux-mm&m=150819356125109
https://nvd.nist.gov/vuln/detail/CVE-2017-15128
https://www.cve.org/CVERecord?id=CVE-2017-15128
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.12
|
| kernel-headers |
CVE-2017-15265 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026
http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8
http://www.openwall.com/lists/oss-security/2017/10/11/3
http://www.securityfocus.com/bid/101288
http://www.securitytracker.com/id/1039561
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/errata/RHSA-2018:1130
https://access.redhat.com/errata/RHSA-2018:1170
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:3822
https://access.redhat.com/errata/RHSA-2018:3823
https://access.redhat.com/security/cve/CVE-2017-15265
https://bugzilla.suse.com/show_bug.cgi?id=1062520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265
https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2017-15265.html
https://linux.oracle.com/errata/ELSA-2018-2390.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-15265
https://source.android.com/security/bulletin/2018-02-01
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3698-1
https://ubuntu.com/security/notices/USN-3698-2
https://usn.ubuntu.com/3698-1/
https://usn.ubuntu.com/3698-2/
https://www.cve.org/CVERecord?id=CVE-2017-15265
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| kernel-headers |
CVE-2017-15299 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/security/cve/CVE-2017-15299
https://bugzilla.redhat.com/show_bug.cgi?id=1498016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15299
https://linux.oracle.com/cve/CVE-2017-15299.html
https://linux.oracle.com/errata/ELSA-2018-4110.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://marc.info/?t=150654188100001&r=1&w=2
https://marc.info/?t=150783958600011&r=1&w=2
https://nvd.nist.gov/vuln/detail/CVE-2017-15299
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3507-1
https://ubuntu.com/security/notices/USN-3507-2
https://ubuntu.com/security/notices/USN-3798-1
https://ubuntu.com/security/notices/USN-3798-2
https://usn.ubuntu.com/3798-1/
https://usn.ubuntu.com/3798-2/
https://www.cve.org/CVERecord?id=CVE-2017-15299
https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1499828.html
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1499828.html
|
| kernel-headers |
CVE-2017-16528 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2017-16528
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16528
https://github.com/torvalds/linux/commit/fc27fe7e8deef2f37cba3f2be2d52b6ca5eb9d57
https://groups.google.com/d/msg/syzkaller/kuZzDHGkQu8/5du20rZEAAAJ
https://linux.oracle.com/cve/CVE-2017-16528.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16528
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://www.cve.org/CVERecord?id=CVE-2017-16528
|
| kernel-headers |
CVE-2017-18079 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=340d394a789518018f834ff70f7534fc463d3226
http://www.securityfocus.com/bid/102895
https://access.redhat.com/security/cve/CVE-2017-18079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18079
https://github.com/torvalds/linux/commit/340d394a789518018f834ff70f7534fc463d3226
https://linux.oracle.com/cve/CVE-2017-18079.html
https://linux.oracle.com/errata/ELSA-2019-4317.html
https://nvd.nist.gov/vuln/detail/CVE-2017-18079
https://ubuntu.com/security/notices/USN-3655-1
https://ubuntu.com/security/notices/USN-3655-2
https://usn.ubuntu.com/3655-1/
https://usn.ubuntu.com/3655-2/
https://www.cve.org/CVERecord?id=CVE-2017-18079
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.4
|
| kernel-headers |
CVE-2017-5972 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://seclists.org/oss-sec/2017/q1/573
http://www.securityfocus.com/bid/96231
https://access.redhat.com/security/cve/CVE-2017-5972
https://access.redhat.com/security/cve/cve-2017-5972
https://bugzilla.redhat.com/show_bug.cgi?id=1422081
https://cxsecurity.com/issue/WLB-2017020112
https://githubengineering.com/syn-flood-mitigation-with-synsanity/
https://nvd.nist.gov/vuln/detail/CVE-2017-5972
https://packetstormsecurity.com/files/141083/CentOS7-Kernel-Denial-Of-Service.html
https://security-tracker.debian.org/tracker/CVE-2017-5972
https://www.cve.org/CVERecord?id=CVE-2017-5972
https://www.exploit-db.com/exploits/41350/
|
| kernel-headers |
CVE-2017-7541 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f44c9a41386729fea410e688959ddaa9d51be7c
http://openwall.com/lists/oss-security/2017/07/24/2
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.3
http://www.securityfocus.com/bid/99955
http://www.securitytracker.com/id/1038981
https://access.redhat.com/errata/RHSA-2017:2863
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/security/cve/CVE-2017-7541
https://bugzilla.novell.com/show_bug.cgi?id=1049645
https://bugzilla.redhat.com/show_bug.cgi?id=1473198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541
https://github.com/torvalds/linux/commit/8f44c9a41386729fea410e688959ddaa9d51be7c
https://linux.oracle.com/cve/CVE-2017-7541.html
https://linux.oracle.com/errata/ELSA-2017-3629.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7541
https://source.android.com/security/bulletin/2017-11-01
https://ubuntu.com/security/notices/USN-3405-1
https://ubuntu.com/security/notices/USN-3405-2
https://ubuntu.com/security/notices/USN-3419-1
https://ubuntu.com/security/notices/USN-3419-2
https://ubuntu.com/security/notices/USN-3422-1
https://ubuntu.com/security/notices/USN-3422-2
https://www.cve.org/CVERecord?id=CVE-2017-7541
https://www.spinics.net/lists/stable/msg180994.html
|
| kernel-headers |
CVE-2017-7542 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6399f1fae4ec29fab5ec76070435555e256ca3a6
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.securityfocus.com/bid/99953
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/errata/RHSA-2018:0169
https://access.redhat.com/security/cve/CVE-2017-7542
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542
https://github.com/torvalds/linux/commit/6399f1fae4ec29fab5ec76070435555e256ca3a6
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://linux.oracle.com/cve/CVE-2017-7542.html
https://linux.oracle.com/errata/ELSA-2018-0169.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7542
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://www.cve.org/CVERecord?id=CVE-2017-7542
|
| kernel-headers |
CVE-2017-7558 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://seclists.org/oss-sec/2017/q3/338
http://www.securityfocus.com/bid/100466
http://www.securitytracker.com/id/1039221
https://access.redhat.com/errata/RHSA-2017:2918
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://access.redhat.com/security/cve/CVE-2017-7558
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7558
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/sctp/socket.c?id=ee6c88bb754e3d363e568da78086adfedb692447
https://linux.oracle.com/cve/CVE-2017-7558.html
https://linux.oracle.com/errata/ELSA-2017-2930.html
https://marc.info/?l=linux-netdev&m=150348777122761&w=2
https://nvd.nist.gov/vuln/detail/CVE-2017-7558
https://www.cve.org/CVERecord?id=CVE-2017-7558
https://www.debian.org/security/2017/dsa-3981
|
| kernel-headers |
CVE-2017-9211 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9933e113c2e87a9f46a40fde8dafbf801dca1ab9
https://access.redhat.com/security/cve/CVE-2017-9211
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9211
https://git.kernel.org/linus/9933e113c2e87a9f46a40fde8dafbf801dca1ab9
https://github.com/torvalds/linux/commit/9933e113c2e87a9f46a40fde8dafbf801dca1ab9
https://nvd.nist.gov/vuln/detail/CVE-2017-9211
https://patchwork.kernel.org/patch/9718933/
https://www.cve.org/CVERecord?id=CVE-2017-9211
|
| kernel-headers |
CVE-2018-17977 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/105539
https://access.redhat.com/security/cve/CVE-2018-17977
https://bugzilla.suse.com/show_bug.cgi?id=1111609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977
https://nvd.nist.gov/vuln/detail/CVE-2018-17977
https://www.cve.org/CVERecord?id=CVE-2018-17977
https://www.openwall.com/lists/oss-security/2018/10/05/5
|
| kernel-headers |
CVE-2019-13631 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html
http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.securityfocus.com/bid/109291
https://access.redhat.com/security/cve/CVE-2019-13631
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631
https://linux.oracle.com/cve/CVE-2019-13631.html
https://linux.oracle.com/errata/ELSA-2019-4746.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQ5BQKTI24DPSVKPOIMMGDTFKCF6ASXT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUXTJSLIQBOJTQDMTUQTQKUWWAJLFVEY/
https://nvd.nist.gov/vuln/detail/CVE-2019-13631
https://patchwork.kernel.org/patch/11040813/
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Aug/26
https://security.netapp.com/advisory/ntap-20190806-0001/
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4145-1
https://ubuntu.com/security/notices/USN-4147-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4145-1/
https://usn.ubuntu.com/4147-1/
https://www.cve.org/CVERecord?id=CVE-2019-13631
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
|
| kernel-headers |
CVE-2019-14284 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html
http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
https://access.redhat.com/security/cve/CVE-2019-14284
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32
https://git.kernel.org/linus/f3554aeb991214cbfafd17d55e2bfddb50282e32
https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32
https://linux.oracle.com/cve/CVE-2019-14284.html
https://linux.oracle.com/errata/ELSA-2019-4855.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14284
https://seclists.org/bugtraq/2019/Aug/13
https://seclists.org/bugtraq/2019/Aug/18
https://seclists.org/bugtraq/2019/Aug/26
https://security.netapp.com/advisory/ntap-20190905-0002/
https://ubuntu.com/security/notices/USN-4114-1
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4116-1
https://ubuntu.com/security/notices/USN-4117-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/4114-1/
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4116-1/
https://usn.ubuntu.com/4117-1/
https://usn.ubuntu.com/4118-1/
https://www.cve.org/CVERecord?id=CVE-2019-14284
https://www.debian.org/security/2019/dsa-4495
https://www.debian.org/security/2019/dsa-4497
|
| kernel-headers |
CVE-2019-14615 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html
http://seclists.org/fulldisclosure/2020/Mar/31
https://access.redhat.com/security/cve/CVE-2019-14615
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14615
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc8a76a152c5f9ef3b48104154a65a68a8b76946
https://linux.oracle.com/cve/CVE-2019-14615.html
https://linux.oracle.com/errata/ELSA-2020-5569.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14615
https://support.apple.com/kb/HT211100
https://ubuntu.com/security/notices/USN-4253-1
https://ubuntu.com/security/notices/USN-4253-2
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4255-1
https://ubuntu.com/security/notices/USN-4255-2
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4253-1/
https://usn.ubuntu.com/4253-2/
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4255-1/
https://usn.ubuntu.com/4255-2/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.cve.org/CVERecord?id=CVE-2019-14615
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html
|
| kernel-headers |
CVE-2019-15213 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
https://access.redhat.com/security/cve/CVE-2019-15213
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7
https://linux.oracle.com/cve/CVE-2019-15213.html
https://linux.oracle.com/errata/ELSA-2019-4872.html
https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/
https://nvd.nist.gov/vuln/detail/CVE-2019-15213
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
https://www.cve.org/CVERecord?id=CVE-2019-15213
|
| kernel-headers |
CVE-2019-15505 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-15505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505
https://git.linuxtv.org/media_tree.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b
https://linux.oracle.com/cve/CVE-2019-15505.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/
https://lore.kernel.org/linux-media/20190821104408.w7krumcglxo6fz5q%40gofer.mess.org/
https://lore.kernel.org/linux-media/20190821104408.w7krumcglxo6fz5q@gofer.mess.org/
https://lore.kernel.org/lkml/b9b256cb-95f2-5fa1-9956-5a602a017c11%40gmail.com/
https://lore.kernel.org/lkml/b9b256cb-95f2-5fa1-9956-5a602a017c11@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2019-15505
https://seclists.org/bugtraq/2019/Nov/11
https://security.netapp.com/advisory/ntap-20190905-0002/
https://support.f5.com/csp/article/K28222050
https://support.f5.com/csp/article/K28222050?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4157-1
https://ubuntu.com/security/notices/USN-4157-2
https://ubuntu.com/security/notices/USN-4162-1
https://ubuntu.com/security/notices/USN-4162-2
https://ubuntu.com/security/notices/USN-4163-1
https://ubuntu.com/security/notices/USN-4163-2
https://usn.ubuntu.com/4157-1/
https://usn.ubuntu.com/4157-2/
https://usn.ubuntu.com/4162-1/
https://usn.ubuntu.com/4162-2/
https://usn.ubuntu.com/4163-1/
https://usn.ubuntu.com/4163-2/
https://www.cve.org/CVERecord?id=CVE-2019-15505
|
| kernel-headers |
CVE-2019-19036 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19036
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19036
https://nvd.nist.gov/vuln/detail/CVE-2019-19036
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4439-1/
https://www.cve.org/CVERecord?id=CVE-2019-19036
|
| kernel-headers |
CVE-2019-19077 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19077
https://github.com/torvalds/linux/commit/4a9d46a9fe14401f21df69cea97c62396d5fb053
https://nvd.nist.gov/vuln/detail/CVE-2019-19077
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://www.cve.org/CVERecord?id=CVE-2019-19077
|
| kernel-headers |
CVE-2019-19377 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2019-19377
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19377
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19377
https://linux.oracle.com/cve/CVE-2019-19377.html
https://linux.oracle.com/errata/ELSA-2022-10065.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://nvd.nist.gov/vuln/detail/CVE-2019-19377
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4367-1
https://ubuntu.com/security/notices/USN-4369-1
https://ubuntu.com/security/notices/USN-4414-1
https://usn.ubuntu.com/4367-1/
https://usn.ubuntu.com/4369-1/
https://usn.ubuntu.com/4414-1/
https://www.cve.org/CVERecord?id=CVE-2019-19377
|
| kernel-headers |
CVE-2019-19528 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19528
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19528
https://git.kernel.org/linus/edc4746f253d907d048de680a621e121517f484b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c468a8aa790e0dfe0a7f8a39db282d39c2c00b46
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=edc4746f253d907d048de680a621e121517f484b
https://linux.oracle.com/cve/CVE-2019-19528.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://nvd.nist.gov/vuln/detail/CVE-2019-19528
https://www.cve.org/CVERecord?id=CVE-2019-19528
|
| kernel-headers |
CVE-2019-19536 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19536
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19536
https://git.kernel.org/linus/ead16e53c2f0ed946d82d4037c630e2f60f4ab69
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ead16e53c2f0ed946d82d4037c630e2f60f4ab69
https://linux.oracle.com/cve/CVE-2019-19536.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2019-19536
https://www.cve.org/CVERecord?id=CVE-2019-19536
https://www.nxp.com/docs/en/reference-manual/BCANPSV2.pdf
|
| kernel-headers |
CVE-2019-19770 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html
https://access.redhat.com/security/cve/CVE-2019-19770
https://bugzilla.kernel.org/show_bug.cgi?id=205713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19770
https://github.com/mcgrof/break-blktrace
https://linux.oracle.com/cve/CVE-2019-19770.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://lore.kernel.org/linux-block/20200402000002.7442-1-mcgrof%40kernel.org/
https://lore.kernel.org/linux-block/20200419194529.4872-1-mcgrof@kernel.org/
https://lore.kernel.org/linux-block/20200516031956.2605-1-mcgrof@kernel.org/
https://nvd.nist.gov/vuln/detail/CVE-2019-19770
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4680-1
https://www.cve.org/CVERecord?id=CVE-2019-19770
|
| kernel-headers |
CVE-2019-19816 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2019-19816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19816
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19816
https://linux.oracle.com/cve/CVE-2019-19816.html
https://linux.oracle.com/errata/ELSA-2020-5995.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://nvd.nist.gov/vuln/detail/CVE-2019-19816
https://security.netapp.com/advisory/ntap-20200103-0001/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4708-1
https://ubuntu.com/security/notices/USN-4709-1
https://usn.ubuntu.com/4414-1/
https://www.cve.org/CVERecord?id=CVE-2019-19816
|
| kernel-headers |
CVE-2019-19927 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19927
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19927
https://github.com/torvalds/linux/commit/453393369dc9806d2455151e329c599684762428
https://github.com/torvalds/linux/commit/a66477b0efe511d98dde3e4aaeb189790e6f0a39
https://github.com/torvalds/linux/commit/ac1e516d5a4c56bf0cb4a3dfc0672f689131cfd4
https://nvd.nist.gov/vuln/detail/CVE-2019-19927
https://security.netapp.com/advisory/ntap-20200204-0002/
https://www.cve.org/CVERecord?id=CVE-2019-19927
|
| kernel-headers |
CVE-2019-2054 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
https://access.redhat.com/security/cve/CVE-2019-2054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2054
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f3912fd934cdfd03d93f2dc6f064099795bf638
https://github.com/GrapheneOS/kernel_google_marlin/commit/bac2f2dde8af50c477b580743deb688db25e9e63
https://nvd.nist.gov/vuln/detail/CVE-2019-2054
https://source.android.com/security/bulletin/2019-05-01
https://ubuntu.com/security/notices/USN-4076-1
https://ubuntu.com/security/notices/USN-4095-2
https://usn.ubuntu.com/4076-1/
https://usn.ubuntu.com/4095-2/
https://www.cve.org/CVERecord?id=CVE-2019-2054
|
| kernel-headers |
CVE-2019-20794 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2020/08/24/1
https://access.redhat.com/security/cve/CVE-2019-20794
https://github.com/sargun/fuse-example
https://nvd.nist.gov/vuln/detail/CVE-2019-20794
https://security.netapp.com/advisory/ntap-20200608-0001/
https://sourceforge.net/p/fuse/mailman/message/36598753/
https://www.cve.org/CVERecord?id=CVE-2019-20794
|
| kernel-headers |
CVE-2019-20812 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
https://access.redhat.com/security/cve/CVE-2019-20812
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20812
https://git.kernel.org/linus/b43d1f9f7067c6759b1051e8ecb84e82cef569fe
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b43d1f9f7067c6759b1051e8ecb84e82cef569fe
https://linux.oracle.com/cve/CVE-2019-20812.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://nvd.nist.gov/vuln/detail/CVE-2019-20812
https://www.cve.org/CVERecord?id=CVE-2019-20812
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers |
CVE-2019-25160 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2019-25160
https://git.kernel.org/stable/c/1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000
https://git.kernel.org/stable/c/5578de4834fe0f2a34fedc7374be691443396d1f
https://git.kernel.org/stable/c/97bc3683c24999ee621d847c9348c75d2fe86272
https://git.kernel.org/stable/c/c61d01faa5550e06794dcf86125ccd325bfad950
https://git.kernel.org/stable/c/dc18101f95fa6e815f426316b8b9a5cee28a334e
https://git.kernel.org/stable/c/e3713abc4248aa6bcc11173d754c418b02a62cbb
https://git.kernel.org/stable/c/fbf9578919d6c91100ec63acf2cba641383f6c78
https://git.kernel.org/stable/c/fcfe700acdc1c72eab231300e82b962bac2b2b2c
https://nvd.nist.gov/vuln/detail/CVE-2019-25160
https://www.cve.org/CVERecord?id=CVE-2019-25160
|
| kernel-headers |
CVE-2019-3874 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2019:3309
https://access.redhat.com/errata/RHSA-2019:3517
https://access.redhat.com/security/cve/CVE-2019-3874
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3874
https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=1033990ac5b2ab6cee93734cb6d301aa3a35bcaa
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=9dde27de3e5efa0d032f3c891a0ca833a0d31911
https://linux.oracle.com/cve/CVE-2019-3874.html
https://linux.oracle.com/errata/ELSA-2020-5885.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u
https://lore.kernel.org/netdev/cover.1554022192.git.lucien.xin@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2019-3874
https://security.netapp.com/advisory/ntap-20190411-0003/
https://ubuntu.com/security/notices/USN-3979-1
https://ubuntu.com/security/notices/USN-3980-1
https://ubuntu.com/security/notices/USN-3980-2
https://ubuntu.com/security/notices/USN-3981-1
https://ubuntu.com/security/notices/USN-3981-2
https://ubuntu.com/security/notices/USN-3982-1
https://ubuntu.com/security/notices/USN-3982-2
https://usn.ubuntu.com/3979-1/
https://usn.ubuntu.com/3980-1/
https://usn.ubuntu.com/3980-2/
https://usn.ubuntu.com/3981-1/
https://usn.ubuntu.com/3981-2/
https://usn.ubuntu.com/3982-1/
https://usn.ubuntu.com/3982-2/
https://www.cve.org/CVERecord?id=CVE-2019-3874
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers |
CVE-2020-0305 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
https://access.redhat.com/security/cve/CVE-2020-0305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0305
https://git.kernel.org/linus/68faa679b8be1a74e6663c21c3a9d25d32f1c079
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079
https://linux.oracle.com/cve/CVE-2020-0305.html
https://linux.oracle.com/errata/ELSA-2021-9442.html
https://nvd.nist.gov/vuln/detail/CVE-2020-0305
https://source.android.com/security/bulletin/pixel/2020-06-01
https://www.cve.org/CVERecord?id=CVE-2020-0305
|
| kernel-headers |
CVE-2020-0404 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2020-0404
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0404
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/68035c80e129c4cfec659aac4180354530b26527
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527
https://linux.oracle.com/cve/CVE-2020-0404.html
https://linux.oracle.com/errata/ELSA-2023-12232.html
https://nvd.nist.gov/vuln/detail/CVE-2020-0404
https://source.android.com/security/bulletin/2020-09-01
https://www.cve.org/CVERecord?id=CVE-2020-0404
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2020-0431 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
https://access.redhat.com/security/cve/CVE-2020-0431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0431
https://git.kernel.org/linus/4f3882177240a1f55e45a3d241d3121341bead78
https://linux.oracle.com/cve/CVE-2020-0431.html
https://linux.oracle.com/errata/ELSA-2021-9086.html
https://nvd.nist.gov/vuln/detail/CVE-2020-0431
https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/
https://source.android.com/security/bulletin/pixel/2020-09-01
https://www.cve.org/CVERecord?id=CVE-2020-0431
|
| kernel-headers |
CVE-2020-10135 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html
http://seclists.org/fulldisclosure/2020/Jun/5
https://access.redhat.com/security/cve/CVE-2020-10135
https://bugzilla.suse.com/show_bug.cgi?id=1171988
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10135
https://francozappa.github.io/about-bias/
https://github.com/marcinguy/CVE-2020-10135-BIAS
https://kb.cert.org/vuls/id/647177/
https://lkml.org/lkml/2020/10/15/98
https://lore.kernel.org/linux-bluetooth/20200520212015.626026-2-luiz.dentz@gmail.com/T/#m3d2012da00716dc280e9725484e8ff1d640d03b5
https://nvd.nist.gov/vuln/detail/CVE-2020-10135
https://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4659-1
https://ubuntu.com/security/notices/USN-4680-1
https://ubuntu.com/security/notices/USN-4752-1
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/bias-vulnerability/
https://www.cve.org/CVERecord?id=CVE-2020-10135
|
| kernel-headers |
CVE-2020-12114 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html
http://www.openwall.com/lists/oss-security/2020/05/04/2
https://access.redhat.com/security/cve/CVE-2020-12114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4edbe133f851c9e3a2f2a1db367e826b01e72594
https://linux.oracle.com/cve/CVE-2020-12114.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12114
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4387-1
https://ubuntu.com/security/notices/USN-4388-1
https://ubuntu.com/security/notices/USN-4389-1
https://ubuntu.com/security/notices/USN-4390-1
https://ubuntu.com/security/notices/USN-4391-1
https://ubuntu.com/security/notices/USN-4392-1
https://usn.ubuntu.com/4387-1/
https://usn.ubuntu.com/4388-1/
https://usn.ubuntu.com/4389-1/
https://usn.ubuntu.com/4390-1/
https://usn.ubuntu.com/4391-1/
https://usn.ubuntu.com/4392-1/
https://www.cve.org/CVERecord?id=CVE-2020-12114
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
https://www.openwall.com/lists/oss-security/2020/05/04/2
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers |
CVE-2020-12464 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-12464
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=056ad39ee9253873522f6469c3364964a322912b
https://git.kernel.org/linus/056ad39ee9253873522f6469c3364964a322912b (5.7-rc3)
https://github.com/torvalds/linux/commit/056ad39ee9253873522f6469c3364964a322912b
https://linux.oracle.com/cve/CVE-2020-12464.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://lkml.org/lkml/2020/3/23/52
https://nvd.nist.gov/vuln/detail/CVE-2020-12464
https://patchwork.kernel.org/patch/11463781/
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4387-1
https://ubuntu.com/security/notices/USN-4388-1
https://ubuntu.com/security/notices/USN-4389-1
https://ubuntu.com/security/notices/USN-4390-1
https://ubuntu.com/security/notices/USN-4391-1
https://usn.ubuntu.com/4387-1/
https://usn.ubuntu.com/4388-1/
https://usn.ubuntu.com/4389-1/
https://usn.ubuntu.com/4390-1/
https://usn.ubuntu.com/4391-1/
https://www.cve.org/CVERecord?id=CVE-2020-12464
https://www.debian.org/security/2020/dsa-4698
https://www.debian.org/security/2020/dsa-4699
|
| kernel-headers |
CVE-2020-13974 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2020-13974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13974
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/b86dab054059b970111b5516ae548efaae5b3aae
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=dad0bf9ce93fa40b667eccd3306783f4db4b932b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae
https://linux.oracle.com/cve/CVE-2020-13974.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html
https://lkml.org/lkml/2020/3/22/482
https://lore.kernel.org/lkml/CAEAjams79+V8bxpcp3UAsU1AnJ+gx2y+ZqhDhjJCpZn2oeZA4Q@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2020-13974
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://ubuntu.com/security/notices/USN-4440-1
https://ubuntu.com/security/notices/USN-4483-1
https://ubuntu.com/security/notices/USN-4485-1
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
https://usn.ubuntu.com/4440-1/
https://usn.ubuntu.com/4483-1/
https://usn.ubuntu.com/4485-1/
https://www.cve.org/CVERecord?id=CVE-2020-13974
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2020-14381 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-14381
https://bugzilla.redhat.com/show_bug.cgi?id=1874311
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14381
https://git.kernel.org/linus/8019ad13ef7f64be44d4f892af9c840179009254
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254
https://linux.oracle.com/cve/CVE-2020-14381.html
https://linux.oracle.com/errata/ELSA-2021-9007.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14381
https://www.cve.org/CVERecord?id=CVE-2020-14381
|
| kernel-headers |
CVE-2020-14416 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
https://access.redhat.com/security/cve/CVE-2020-14416
https://bugzilla.suse.com/show_bug.cgi?id=1162002
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.16
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14416
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ace17d56824165c7f4c68785d6b58971db954dd
https://linux.oracle.com/cve/CVE-2020-14416.html
https://linux.oracle.com/errata/ELSA-2020-5801.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14416
https://www.cve.org/CVERecord?id=CVE-2020-14416
|
| kernel-headers |
CVE-2020-16166 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html
https://access.redhat.com/security/cve/CVE-2020-16166
https://arxiv.org/pdf/2012.07432.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f227e3ec3b5cad859ad15666874405e8c1bbc1d4
https://git.kernel.org/linus/f227e3ec3b5cad859ad15666874405e8c1bbc1d4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c51f8f88d705e06bd696d7510aff22b33eb8e638
https://github.com/torvalds/linux/commit/f227e3ec3b5cad859ad15666874405e8c1bbc1d4
https://linux.oracle.com/cve/CVE-2020-16166.html
https://linux.oracle.com/errata/ELSA-2020-5962.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AAPTLPAEKVAJYJ4LHN7VH4CN2W75R2YW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MFBCLQWJI5I4G25TVJNLXLAXJ4MERQNW/
https://nvd.nist.gov/vuln/detail/CVE-2020-16166
https://security.netapp.com/advisory/ntap-20200814-0004/
https://ubuntu.com/security/notices/USN-4525-1
https://ubuntu.com/security/notices/USN-4526-1
https://usn.ubuntu.com/4525-1/
https://usn.ubuntu.com/4526-1/
https://www.cve.org/CVERecord?id=CVE-2020-16166
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers |
CVE-2020-24502 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-24502
https://linux.oracle.com/cve/CVE-2020-24502.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-24502
https://www.cve.org/CVERecord?id=CVE-2020-24502
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
|
| kernel-headers |
CVE-2020-24503 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-24503
https://linux.oracle.com/cve/CVE-2020-24503.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-24503
https://www.cve.org/CVERecord?id=CVE-2020-24503
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
|
| kernel-headers |
CVE-2020-24504 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-24504
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504
https://linux.oracle.com/cve/CVE-2020-24504.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://nvd.nist.gov/vuln/detail/CVE-2020-24504
https://www.cve.org/CVERecord?id=CVE-2020-24504
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
|
| kernel-headers |
CVE-2020-24586 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-24586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-24586.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/
https://nvd.nist.gov/vuln/detail/CVE-2020-24586
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.cve.org/CVERecord?id=CVE-2020-24586
https://www.fragattacks.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
|
| kernel-headers |
CVE-2020-24587 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-24587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-24587.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/
https://nvd.nist.gov/vuln/detail/CVE-2020-24587
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.cve.org/CVERecord?id=CVE-2020-24587
https://www.fragattacks.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
|
| kernel-headers |
CVE-2020-24588 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-24588
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-24588.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/
https://nvd.nist.gov/vuln/detail/CVE-2020-24588
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.cve.org/CVERecord?id=CVE-2020-24588
https://www.fragattacks.com
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
|
| kernel-headers |
CVE-2020-25284 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
https://access.redhat.com/security/cve/CVE-2020-25284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284
https://git.kernel.org/linus/f44d04e696feaf13d192d942c4f14ad2e117065a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f44d04e696feaf13d192d942c4f14ad2e117065a
https://linux.oracle.com/cve/CVE-2020-25284.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-25284
https://twitter.com/grsecurity/status/1304537507560919041
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4752-1
https://www.cve.org/CVERecord?id=CVE-2020-25284
|
| kernel-headers |
CVE-2020-25285 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-25285
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25285
https://git.kernel.org/linus/17743798d81238ab13050e8e2833699b54e15467
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17743798d81238ab13050e8e2833699b54e15467
https://linux.oracle.com/cve/CVE-2020-25285.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-25285
https://security.netapp.com/advisory/ntap-20201009-0002/
https://twitter.com/grsecurity/status/1303749848898904067
https://ubuntu.com/security/notices/USN-4576-1
https://ubuntu.com/security/notices/USN-4579-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4912-1
https://usn.ubuntu.com/4576-1/
https://usn.ubuntu.com/4579-1/
https://www.cve.org/CVERecord?id=CVE-2020-25285
|
| kernel-headers |
CVE-2020-26139 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26139
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26139.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/
https://nvd.nist.gov/vuln/detail/CVE-2020-26139
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.cve.org/CVERecord?id=CVE-2020-26139
https://www.fragattacks.com
|
| kernel-headers |
CVE-2020-26140 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26140
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26140.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://nvd.nist.gov/vuln/detail/CVE-2020-26140
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.cve.org/CVERecord?id=CVE-2020-26140
https://www.fragattacks.com
|
| kernel-headers |
CVE-2020-26141 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26141
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26141.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/
https://nvd.nist.gov/vuln/detail/CVE-2020-26141
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.cve.org/CVERecord?id=CVE-2020-26141
https://www.fragattacks.com
|
| kernel-headers |
CVE-2020-26143 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26143
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26143.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://nvd.nist.gov/vuln/detail/CVE-2020-26143
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.cve.org/CVERecord?id=CVE-2020-26143
https://www.fragattacks.com
|
| kernel-headers |
CVE-2020-26144 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26144
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26144
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26144.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/all/20210513070303.20253-1-nbd@nbd.name/
https://lore.kernel.org/linux-wireless/20210511180259.159598-1-johannes@sipsolutions.net/
https://nvd.nist.gov/vuln/detail/CVE-2020-26144
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.cve.org/CVERecord?id=CVE-2020-26144
https://www.fragattacks.com
|
| kernel-headers |
CVE-2020-26555 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-26555
https://bugzilla.redhat.com/show_bug.cgi?id=1918601
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555
https://kb.cert.org/vuls/id/799380
https://linux.oracle.com/cve/CVE-2020-26555.html
https://linux.oracle.com/errata/ELSA-2024-12159.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/
https://lore.kernel.org/lkml/20231001084934.GA16906@linux-691t/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-26555
https://ubuntu.com/security/notices/USN-5343-1
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/
https://www.cve.org/CVERecord?id=CVE-2020-26555
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
|
| kernel-headers |
CVE-2020-27067 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-27067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27067
https://nvd.nist.gov/vuln/detail/CVE-2020-27067
https://salsa.debian.org/kernel-team/kernel-sec/-/blob/master/retired/CVE-2020-27067
https://source.android.com/security/bulletin/pixel/2020-12-01
https://www.cve.org/CVERecord?id=CVE-2020-27067
|
| kernel-headers |
CVE-2020-27171 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
http://www.openwall.com/lists/oss-security/2021/03/24/5
https://access.redhat.com/security/cve/CVE-2020-27171
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27171
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=10d2bb2e6b1d8c4576c56a748f697dbeb8388899
https://linux.oracle.com/cve/CVE-2020-27171.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2020-27171
https://ubuntu.com/security/notices/USN-4887-1
https://ubuntu.com/security/notices/USN-4890-1
https://www.cve.org/CVERecord?id=CVE-2020-27171
https://www.openwall.com/lists/oss-security/2021/03/19/3
|
| kernel-headers |
CVE-2020-27418 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://fedora.com
https://access.redhat.com/security/cve/CVE-2020-27418
https://nvd.nist.gov/vuln/detail/CVE-2020-27418
https://patchwork.freedesktop.org/patch/356372/
https://www.cve.org/CVERecord?id=CVE-2020-27418
|
| kernel-headers |
CVE-2020-27786 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2020/12/03/1
https://access.redhat.com/security/cve/CVE-2020-27786
https://bugzilla.redhat.com/show_bug.cgi?id=1900933
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27786
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d
https://linux.oracle.com/cve/CVE-2020-27786.html
https://linux.oracle.com/errata/ELSA-2021-9030.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27786
https://security.netapp.com/advisory/ntap-20210122-0002/
https://www.cve.org/CVERecord?id=CVE-2020-27786
https://www.openwall.com/lists/oss-security/2020/12/01/1
|
| kernel-headers |
CVE-2020-27835 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-27835
https://bugzilla.redhat.com/show_bug.cgi?id=1901709
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835
https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79
https://linux.oracle.com/cve/CVE-2020-27835.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://nvd.nist.gov/vuln/detail/CVE-2020-27835
https://ubuntu.com/security/notices/USN-4751-1
https://www.cve.org/CVERecord?id=CVE-2020-27835
|
| kernel-headers |
CVE-2020-28097 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28097
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28097
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=973c096f6a85e5b5f2a295126ba6928d9a6afd45
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=973c096f6a85e5b5f2a295126ba6928d9a6afd45
https://github.com/torvalds/linux/commit/973c096f6a85e5b5f2a295126ba6928d9a6afd45
https://linux.oracle.com/cve/CVE-2020-28097.html
https://linux.oracle.com/errata/ELSA-2021-9442.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28097
https://seclists.org/oss-sec/2020/q3/176
https://security.netapp.com/advisory/ntap-20210805-0001/
https://www.cve.org/CVERecord?id=CVE-2020-28097
https://www.openwall.com/lists/oss-security/2020/09/16/1
|
| kernel-headers |
CVE-2020-28915 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:5344
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-28915.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27666.json
https://access.redhat.com/security/cve/CVE-2020-28915
https://bugzilla.redhat.com/1899177
https://bugzilla.redhat.com/2061633
https://bugzilla.suse.com/show_bug.cgi?id=1178886
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28915
https://errata.almalinux.org/8/ALSA-2022-5344.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5af08640795b2b9a940c9266c0260455377ae262
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6735b4632def0640dbdf4eb9f99816aca18c4f16
https://linux.oracle.com/cve/CVE-2020-28915.html
https://linux.oracle.com/errata/ELSA-2022-5316.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28915
https://syzkaller.appspot.com/bug?id=08b8be45afea11888776f897895aef9ad1c3ecfd
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4659-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4752-1
https://www.cve.org/CVERecord?id=CVE-2020-28915
|
| kernel-headers |
CVE-2020-28974 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2020/11/25/1
https://access.redhat.com/security/cve/CVE-2020-28974
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28974
https://git.kernel.org/linus/3c4e0dff2095c579b142d5a0693257f1c58b4804
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804
https://linux.oracle.com/cve/CVE-2020-28974.html
https://linux.oracle.com/errata/ELSA-2021-9043.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28974
https://seclists.org/oss-sec/2020/q4/104
https://security.netapp.com/advisory/ntap-20210108-0003/
https://ubuntu.com/security/notices/USN-4679-1
https://ubuntu.com/security/notices/USN-4680-1
https://ubuntu.com/security/notices/USN-4681-1
https://ubuntu.com/security/notices/USN-4683-1
https://ubuntu.com/security/notices/USN-4751-1
https://www.cve.org/CVERecord?id=CVE-2020-28974
https://www.openwall.com/lists/oss-security/2020/11/09/2
|
| kernel-headers |
CVE-2020-29374 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html
https://access.redhat.com/security/cve/CVE-2020-29374
https://bugs.chromium.org/p/project-zero/issues/detail?id=2045
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374
https://git.kernel.org/linus/17839856fd588f4ab6b789f482ed3ffd7c403e1f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29374
https://security.netapp.com/advisory/ntap-20210115-0002/
https://ubuntu.com/security/notices/USN-4748-1
https://ubuntu.com/security/notices/USN-4749-1
https://www.cve.org/CVERecord?id=CVE-2020-29374
https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers |
CVE-2020-36158 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-36158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c455c5ab332773464d02ba17015acdca198f03d
https://git.kernel.org/linus/5c455c5ab332773464d02ba17015acdca198f03d (5.11-rc1)
https://github.com/torvalds/linux/commit/5c455c5ab332773464d02ba17015acdca198f03d
https://linux.oracle.com/cve/CVE-2020-36158.html
https://linux.oracle.com/errata/ELSA-2021-9043.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCHBIRS27VMOGMBHPWP2R7SZRFXT6O6U/
https://lore.kernel.org/r/20201206084801.26479-1-ruc_zhangxiaohui%40163.com
https://lore.kernel.org/r/20201206084801.26479-1-ruc_zhangxiaohui@163.com
https://nvd.nist.gov/vuln/detail/CVE-2020-36158
https://patchwork.kernel.org/project/linux-wireless/patch/20201206084801.26479-1-ruc_zhangxiaohui%40163.com/
https://patchwork.kernel.org/project/linux-wireless/patch/20201206084801.26479-1-ruc_zhangxiaohui@163.com/
https://security.netapp.com/advisory/ntap-20210212-0002/
https://ubuntu.com/security/notices/USN-4876-1
https://ubuntu.com/security/notices/USN-4877-1
https://ubuntu.com/security/notices/USN-4878-1
https://ubuntu.com/security/notices/USN-4879-1
https://ubuntu.com/security/notices/USN-4912-1
https://www.cve.org/CVERecord?id=CVE-2020-36158
https://www.debian.org/security/2021/dsa-4843
|
| kernel-headers |
CVE-2020-36386 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-36386
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36386
https://git.kernel.org/linus/51c19bf3d5cfaa66571e4b88ba2a6f6295311101
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101
https://linux.oracle.com/cve/CVE-2020-36386.html
https://linux.oracle.com/errata/ELSA-2021-9346.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36386
https://sites.google.com/view/syzscope/kasan-slab-out-of-bounds-read-in-hci_extended_inquiry_result_evt
https://syzkaller.appspot.com/bug?id=4bf11aa05c4ca51ce0df86e500fce486552dc8d2
https://syzkaller.appspot.com/text?tag=ReproC&x=15ca2f46900000
https://www.cve.org/CVERecord?id=CVE-2020-36386
|
| kernel-headers |
CVE-2020-36516 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2020-36516
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
https://dl.acm.org/doi/10.1145/3372297.3417884
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://errata.rockylinux.org/RLSA-2022:7683
https://linux.oracle.com/cve/CVE-2020-36516.html
https://linux.oracle.com/errata/ELSA-2022-9761.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36516
https://security.netapp.com/advisory/ntap-20220331-0003/
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2020-36516
https://www.spinics.net/lists/netdev/msg795642.html
|
| kernel-headers |
CVE-2020-36694 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-36694
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36694
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c
https://nvd.nist.gov/vuln/detail/CVE-2020-36694
https://security.netapp.com/advisory/ntap-20230622-0005/
https://syzkaller.appspot.com/bug?id=0c4fd9c6aa04ec116d01e915d3b186f71a212cb2
https://www.cve.org/CVERecord?id=CVE-2020-36694
|
| kernel-headers |
CVE-2020-3702 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-3702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/linux-wireless/CABvG-CVvPF++0vuGzCrBj8+s=Bcx1GwWfiW1_Somu_GVncTAcQ@mail.gmail.com/
https://lore.kernel.org/stable/20210818084859.vcs4vs3yd6zetmyt@pali/t/#mf8b430d4f19f1b939a29b6c5098fdc514fd1a928
https://nvd.nist.gov/vuln/detail/CVE-2020-3702
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5361-1
https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58
https://www.cve.org/CVERecord?id=CVE-2020-3702
https://www.debian.org/security/2021/dsa-4978
https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
| kernel-headers |
CVE-2020-4788 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2020/11/20/3
http://www.openwall.com/lists/oss-security/2020/11/23/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2020-4788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4788
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/189296
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dda3f4252e6c8b833a2ef164afd3da9808d0f07c
https://linux.oracle.com/cve/CVE-2020-4788.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TITJQPYDWZ4NB2ONJWUXW75KSQIPF35T/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZF4OGZPKTAJJXWHPIFP3LHEWWEMR5LPT/
https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc
https://nvd.nist.gov/vuln/detail/CVE-2020-4788
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4659-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4681-1
https://www.cve.org/CVERecord?id=CVE-2020-4788
https://www.ibm.com/support/pages/node/6370729
https://www.openwall.com/lists/oss-security/2020/11/20/3
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2020-8694 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-8694
https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8694
https://linux.oracle.com/cve/CVE-2020-8694.html
https://linux.oracle.com/errata/ELSA-2020-5996.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8694
https://platypusattack.com/
https://ubuntu.com/security/notices/USN-4626-1
https://ubuntu.com/security/notices/USN-4627-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Platypus
https://www.cve.org/CVERecord?id=CVE-2020-8694
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html
|
| kernel-headers |
CVE-2020-8832 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-8832
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1862840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8832
https://nvd.nist.gov/vuln/detail/CVE-2020-8832
https://security.netapp.com/advisory/ntap-20200430-0004/
https://ubuntu.com/security/notices/USN-4302-1
https://usn.ubuntu.com/usn/usn-4302-1
https://www.cve.org/CVERecord?id=CVE-2020-8832
|
| kernel-headers |
CVE-2021-0129 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-0129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f
https://linux.oracle.com/cve/CVE-2021-0129.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html
https://nvd.nist.gov/vuln/detail/CVE-2021-0129
https://security.gentoo.org/glsa/202209-16
https://security.netapp.com/advisory/ntap-20210716-0002/
https://ubuntu.com/security/notices/USN-5017-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5046-1
https://ubuntu.com/security/notices/USN-5050-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.cve.org/CVERecord?id=CVE-2021-0129
https://www.debian.org/security/2021/dsa-4951
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html
|
| kernel-headers |
CVE-2021-0512 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36385.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0512.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3656.json
https://access.redhat.com/security/cve/CVE-2021-0512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0512
https://git.kernel.org/linus/ed9be64eefe26d7d8b0b5b9fa3ffdf425d87a01f
https://linux.oracle.com/cve/CVE-2021-0512.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lore.kernel.org/lkml/20210301161013.666159680@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-0512
https://source.android.com/security/bulletin/2021-06-01
https://www.cve.org/CVERecord?id=CVE-2021-0512
|
| kernel-headers |
CVE-2021-20219 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-20219
https://bugzilla.redhat.com/show_bug.cgi?id=1923738
https://linux.oracle.com/cve/CVE-2021-20219.html
https://linux.oracle.com/errata/ELSA-2021-9215.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20219
https://www.cve.org/CVERecord?id=CVE-2021-20219
|
| kernel-headers |
CVE-2021-20261 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-20261
https://bugzilla.redhat.com/show_bug.cgi?id=1932150
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20261
https://git.kernel.org/linus/a0c80efe5956ccce9fe7ae5c78542578c07bc20a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a0c80efe5956ccce9fe7ae5c78542578c07bc20a
https://linux.oracle.com/cve/CVE-2021-20261.html
https://linux.oracle.com/errata/ELSA-2021-9215.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20261
https://ubuntu.com/security/notices/USN-4904-1
https://www.cve.org/CVERecord?id=CVE-2021-20261
|
| kernel-headers |
CVE-2021-20317 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20317.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43267.json
https://access.redhat.com/security/cve/CVE-2021-20317
https://bugzilla.redhat.com/show_bug.cgi?id=2005258
https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317
https://git.kernel.org/linus/511885d7061eda3eb1faf3f57dcc936ff75863f1 (5.4-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=511885d7061eda3eb1faf3f57dcc936ff75863f1
https://linux.oracle.com/cve/CVE-2021-20317.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20317
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.cve.org/CVERecord?id=CVE-2021-20317
https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers |
CVE-2021-20321 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-20321
https://bugzilla.redhat.com/show_bug.cgi?id=2013242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321
https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5)
https://linux.oracle.com/cve/CVE-2021-20321.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/20211011134508.748956131%40linuxfoundation.org/
https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-20321
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://ubuntu.com/security/notices/USN-6221-1
https://www.cve.org/CVERecord?id=CVE-2021-20321
https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers |
CVE-2021-20322 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-20322
https://bugzilla.redhat.com/show_bug.cgi?id=2014230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
https://linux.oracle.com/cve/CVE-2021-20322.html
https://linux.oracle.com/errata/ELSA-2022-9260.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-20322
https://security.netapp.com/advisory/ntap-20220303-0002/
https://ubuntu.com/security/notices/USN-5268-1
https://www.cve.org/CVERecord?id=CVE-2021-20322
https://www.debian.org/security/2022/dsa-5096
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2021-23133 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/05/10/1
http://www.openwall.com/lists/oss-security/2021/05/10/2
http://www.openwall.com/lists/oss-security/2021/05/10/3
http://www.openwall.com/lists/oss-security/2021/05/10/4
https://access.redhat.com/security/cve/CVE-2021-23133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23133
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b
https://linux.oracle.com/cve/CVE-2021-23133.html
https://linux.oracle.com/errata/ELSA-2021-9363.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/
https://nvd.nist.gov/vuln/detail/CVE-2021-23133
https://security.netapp.com/advisory/ntap-20210611-0008/
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5003-1
https://www.cve.org/CVERecord?id=CVE-2021-23133
https://www.openwall.com/lists/oss-security/2021/04/18/2
|
| kernel-headers |
CVE-2021-28711 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-28711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-28711
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2021-28711
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
|
| kernel-headers |
CVE-2021-28712 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-28712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-28712
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2021-28712
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
|
| kernel-headers |
CVE-2021-28713 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-28713
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-28713
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5298-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5377-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2021-28713
https://www.debian.org/security/2022/dsa-5050
https://www.debian.org/security/2022/dsa-5096
https://xenbits.xen.org/xsa/advisory-391.html
https://xenbits.xenproject.org/xsa/advisory-391.txt
|
| kernel-headers |
CVE-2021-28964 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-28964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28964
https://git.kernel.org/linus/dbcc7d57bffc0c8cac9dac11bec548597d59a6a5
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5
https://linux.oracle.com/cve/CVE-2021-28964.html
https://linux.oracle.com/errata/ELSA-2021-9223.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2021-28964
https://security.netapp.com/advisory/ntap-20210430-0003/
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.cve.org/CVERecord?id=CVE-2021-28964
|
| kernel-headers |
CVE-2021-28972 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-28972
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28972
https://git.kernel.org/linus/cc7a0bb058b85ea03db87169c60c7cfdd5d34678
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/
https://nvd.nist.gov/vuln/detail/CVE-2021-28972
https://security.netapp.com/advisory/ntap-20210430-0003/
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.cve.org/CVERecord?id=CVE-2021-28972
|
| kernel-headers |
CVE-2021-29155 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-29155
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29155
https://linux.oracle.com/cve/CVE-2021-29155.html
https://linux.oracle.com/errata/ELSA-2021-9363.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/
https://nvd.nist.gov/vuln/detail/CVE-2021-29155
https://ubuntu.com/security/notices/USN-4977-1
https://ubuntu.com/security/notices/USN-4983-1
https://ubuntu.com/security/notices/USN-4999-1
https://www.cve.org/CVERecord?id=CVE-2021-29155
https://www.kernel.org
https://www.openwall.com/lists/oss-security/2021/04/18/4
|
| kernel-headers |
CVE-2021-30002 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:7683
https://access.redhat.com/security/cve/CVE-2021-30002
https://bugzilla.redhat.com/1946279
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2062284
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2069408
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2070220
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2096178
https://bugzilla.redhat.com/2112693
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2120175
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://bugzilla.suse.com/show_bug.cgi?id=1184120
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
https://errata.almalinux.org/8/ALSA-2022-7683.html
https://errata.rockylinux.org/RLSA-2022:7683
https://git.kernel.org/linus/fb18802a338b36f675a388fc03d2aa504a0d0899
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899
https://linux.oracle.com/cve/CVE-2021-30002.html
https://linux.oracle.com/errata/ELSA-2022-9852.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2021-30002
https://ubuntu.com/security/notices/USN-4945-1
https://ubuntu.com/security/notices/USN-4945-2
https://ubuntu.com/security/notices/USN-4946-1
https://ubuntu.com/security/notices/USN-4947-1
https://ubuntu.com/security/notices/USN-4984-1
https://www.cve.org/CVERecord?id=CVE-2021-30002
|
| kernel-headers |
CVE-2021-3178 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-3178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3178
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51b2ee7d006a736a9126e8111d1f24e4fd0afaa6
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5SGB7TNDVQEOJ7NVTGX56UWHDNQM5TRC/
https://nvd.nist.gov/vuln/detail/CVE-2021-3178
https://patchwork.kernel.org/project/linux-nfs/patch/20210111210129.GA11652%40fieldses.org/
https://patchwork.kernel.org/project/linux-nfs/patch/20210111210129.GA11652@fieldses.org/
https://ubuntu.com/security/notices/USN-4876-1
https://ubuntu.com/security/notices/USN-4877-1
https://ubuntu.com/security/notices/USN-4878-1
https://ubuntu.com/security/notices/USN-4910-1
https://ubuntu.com/security/notices/USN-4912-1
https://www.cve.org/CVERecord?id=CVE-2021-3178
|
| kernel-headers |
CVE-2021-31829 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/05/04/4
https://access.redhat.com/security/cve/CVE-2021-31829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31829
https://github.com/torvalds/linux/commit/801c6058d14a82179a7ee17a4b532cac6fad067f
https://linux.oracle.com/cve/CVE-2021-31829.html
https://linux.oracle.com/errata/ELSA-2021-9363.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VWCZ6LJLENL2C3URW5ICARTACXPFCFN2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y4X2G5YAPYJGI3PFEZZNOTRYI33GOCCZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI7OBCJQDNWMKLBP6MZ5NV4EUTDAMX6Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-31829
https://ubuntu.com/security/notices/USN-4983-1
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5018-1
https://www.cve.org/CVERecord?id=CVE-2021-31829
https://www.openwall.com/lists/oss-security/2021/05/04/4
|
| kernel-headers |
CVE-2021-33098 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-33098
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33098
https://linux.oracle.com/cve/CVE-2021-33098.html
https://linux.oracle.com/errata/ELSA-2024-12110.html
https://nvd.nist.gov/vuln/detail/CVE-2021-33098
https://security.netapp.com/advisory/ntap-20211210-0005/
https://ubuntu.com/security/notices/USN-5343-1
https://www.cve.org/CVERecord?id=CVE-2021-33098
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html
|
| kernel-headers |
CVE-2021-33200 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-33200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33200
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e
https://linux.oracle.com/cve/CVE-2021-33200.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LR3OKKPHIBGOMHN476CMLW2T7UG53QX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJCABL43FT3FKRX5DBPZG25FNKR6CEK4/
https://nvd.nist.gov/vuln/detail/CVE-2021-33200
https://security.netapp.com/advisory/ntap-20210706-0004/
https://ubuntu.com/security/notices/USN-4983-1
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5018-1
https://www.cve.org/CVERecord?id=CVE-2021-33200
https://www.openwall.com/lists/oss-security/2021/05/27/1
|
| kernel-headers |
CVE-2021-33624 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/06/21/1
https://access.redhat.com/security/cve/CVE-2021-33624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9183671af6dbf60a1219371d4ed73e23f43b49db
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=973377ffe8148180b2651825b92ae91988141b05
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d203b0fd863a2261e5d00b97f3d060c4c2a6db71
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fe9a5ca7e370e613a9a75a13008a3845ea759d6e
https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://nvd.nist.gov/vuln/detail/CVE-2021-33624
https://ubuntu.com/security/notices/USN-5091-1
https://ubuntu.com/security/notices/USN-5091-2
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5115-1
https://www.cve.org/CVERecord?id=CVE-2021-33624
https://www.openwall.com/lists/oss-security/2021/06/21/1
https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner
|
| kernel-headers |
CVE-2021-33630 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2024/01/30/10
http://www.openwall.com/lists/oss-security/2024/01/30/3
http://www.openwall.com/lists/oss-security/2024/01/30/4
http://www.openwall.com/lists/oss-security/2024/01/30/5
http://www.openwall.com/lists/oss-security/2024/01/30/9
http://www.openwall.com/lists/oss-security/2024/01/31/2
http://www.openwall.com/lists/oss-security/2024/01/31/3
http://www.openwall.com/lists/oss-security/2024/02/02/6
http://www.openwall.com/lists/oss-security/2024/02/02/9
http://www.openwall.com/lists/oss-security/2024/02/03/1
https://access.redhat.com/security/cve/CVE-2021-33630
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e8b9bfa110896f95d602d8c98d5f9d67e41d78c
https://gitee.com/src-openeuler/kernel/pulls/1389
https://nvd.nist.gov/vuln/detail/CVE-2021-33630
https://seclists.org/oss-sec/2024/q1/65
https://www.cve.org/CVERecord?id=CVE-2021-33630
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031
|
| kernel-headers |
CVE-2021-33631 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2024/01/30/10
http://www.openwall.com/lists/oss-security/2024/01/30/3
http://www.openwall.com/lists/oss-security/2024/01/30/4
http://www.openwall.com/lists/oss-security/2024/01/30/5
http://www.openwall.com/lists/oss-security/2024/01/30/9
http://www.openwall.com/lists/oss-security/2024/01/31/2
http://www.openwall.com/lists/oss-security/2024/01/31/3
http://www.openwall.com/lists/oss-security/2024/02/02/6
http://www.openwall.com/lists/oss-security/2024/02/02/9
http://www.openwall.com/lists/oss-security/2024/02/03/1
https://access.redhat.com/security/cve/CVE-2021-33631
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8
https://gitee.com/src-openeuler/kernel/pulls/1389
https://gitee.com/src-openeuler/kernel/pulls/1396
https://nvd.nist.gov/vuln/detail/CVE-2021-33631
https://seclists.org/oss-sec/2024/q1/65
https://www.cve.org/CVERecord?id=CVE-2021-33631
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035
|
| kernel-headers |
CVE-2021-33655 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2022/07/19/2
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2021-33655
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=086ff84617185393a0bbf25830c4f36412a7d3f4
https://linux.oracle.com/cve/CVE-2021-33655.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2021-33655
https://ubuntu.com/security/notices/USN-5577-1
https://ubuntu.com/security/notices/USN-5580-1
https://ubuntu.com/security/notices/USN-5596-1
https://ubuntu.com/security/notices/USN-5621-1
https://ubuntu.com/security/notices/USN-5622-1
https://ubuntu.com/security/notices/USN-5623-1
https://ubuntu.com/security/notices/USN-5624-1
https://ubuntu.com/security/notices/USN-5630-1
https://ubuntu.com/security/notices/USN-5633-1
https://ubuntu.com/security/notices/USN-5635-1
https://ubuntu.com/security/notices/USN-5639-1
https://ubuntu.com/security/notices/USN-5640-1
https://ubuntu.com/security/notices/USN-5644-1
https://ubuntu.com/security/notices/USN-5647-1
https://ubuntu.com/security/notices/USN-5648-1
https://ubuntu.com/security/notices/USN-5650-1
https://ubuntu.com/security/notices/USN-5652-1
https://ubuntu.com/security/notices/USN-5654-1
https://ubuntu.com/security/notices/USN-5655-1
https://ubuntu.com/security/notices/USN-5660-1
https://ubuntu.com/security/notices/USN-5683-1
https://www.cve.org/CVERecord?id=CVE-2021-33655
https://www.debian.org/security/2022/dsa-5191
|
| kernel-headers |
CVE-2021-33656 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2022/07/19/3
https://access.redhat.com/errata/RHSA-2023:2951
https://access.redhat.com/security/cve/CVE-2021-33656
https://bugzilla.redhat.com/2055499
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2085300
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2108696
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2122960
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2127985
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2150999
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2168297
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2180936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33656
https://errata.almalinux.org/8/ALSA-2023-2951.html
https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/releases/5.10.127/vt-drop-old-font-ioctls.patch
https://linux.oracle.com/cve/CVE-2021-33656.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2021-33656
https://ubuntu.com/security/notices/USN-5580-1
https://ubuntu.com/security/notices/USN-5589-1
https://ubuntu.com/security/notices/USN-5591-1
https://ubuntu.com/security/notices/USN-5591-2
https://ubuntu.com/security/notices/USN-5591-3
https://ubuntu.com/security/notices/USN-5591-4
https://ubuntu.com/security/notices/USN-5592-1
https://ubuntu.com/security/notices/USN-5595-1
https://ubuntu.com/security/notices/USN-5597-1
https://ubuntu.com/security/notices/USN-5598-1
https://ubuntu.com/security/notices/USN-5600-1
https://ubuntu.com/security/notices/USN-5603-1
https://ubuntu.com/security/notices/USN-5605-1
https://ubuntu.com/security/notices/USN-5650-1
https://www.cve.org/CVERecord?id=CVE-2021-33656
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-33656&packageName=kernel
|
| kernel-headers |
CVE-2021-34556 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/08/01/3
https://access.redhat.com/security/cve/CVE-2021-34556
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/
https://nvd.nist.gov/vuln/detail/CVE-2021-34556
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.cve.org/CVERecord?id=CVE-2021-34556
https://www.openwall.com/lists/oss-security/2021/08/01/3
|
| kernel-headers |
CVE-2021-34693 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/06/15/1
https://access.redhat.com/security/cve/CVE-2021-34693
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693
https://linux.oracle.com/cve/CVE-2021-34693.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html
https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html
https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076%403c-app-gmx-bs04/T/
https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-34693
https://ubuntu.com/security/notices/USN-5045-1
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5073-3
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.cve.org/CVERecord?id=CVE-2021-34693
https://www.debian.org/security/2021/dsa-4941
https://www.openwall.com/lists/oss-security/2021/06/15/1
|
| kernel-headers |
CVE-2021-34866 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-34866
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34866
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=5b029a32cfe4600f5e10e36b41778506b90fd4de
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5b029a32cfe4600f5e10e36b41778506b90fd4de
https://nvd.nist.gov/vuln/detail/CVE-2021-34866
https://security.netapp.com/advisory/ntap-20220217-0008/
https://www.cve.org/CVERecord?id=CVE-2021-34866
https://www.zerodayinitiative.com/advisories/ZDI-21-1148/
|
| kernel-headers |
CVE-2021-34981 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-34981
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981
https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479
https://linux.oracle.com/cve/CVE-2021-34981.html
https://linux.oracle.com/errata/ELSA-2024-12193.html
https://nvd.nist.gov/vuln/detail/CVE-2021-34981
https://www.cve.org/CVERecord?id=CVE-2021-34981
https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
|
| kernel-headers |
CVE-2021-35477 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-35477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/
https://nvd.nist.gov/vuln/detail/CVE-2021-35477
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://www.cve.org/CVERecord?id=CVE-2021-35477
https://www.openwall.com/lists/oss-security/2021/08/01/3
|
| kernel-headers |
CVE-2021-3600 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-3600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600
https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90
https://linux.oracle.com/cve/CVE-2021-3600.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://lore.kernel.org/patchwork/patch/1379497/
https://nvd.nist.gov/vuln/detail/CVE-2021-3600
https://ubuntu.com/security/notices/USN-5003-1
https://www.cve.org/CVERecord?id=CVE-2021-3600
https://www.openwall.com/lists/oss-security/2021/06/23/1
|
| kernel-headers |
CVE-2021-3609 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22543.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22555.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3609.json
https://access.redhat.com/security/cve/CVE-2021-3609
https://bugzilla.redhat.com/show_bug.cgi?id=1971651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609
https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md
https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463
https://linux.oracle.com/cve/CVE-2021-3609.html
https://linux.oracle.com/errata/ELSA-2021-9453.html
https://lore.kernel.org/netdev/20210618071532.kr7o2rnx6ia4t6n6@pengutronix.de/T/#t
https://lore.kernel.org/netdev/20210619161813.2098382-1-cascardo@canonical.com/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-3609
https://security.netapp.com/advisory/ntap-20220419-0004/
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5002-1
https://ubuntu.com/security/notices/USN-5003-1
https://ubuntu.com/security/notices/USN-5082-1
https://ubuntu.com/security/notices/USN-5505-1
https://ubuntu.com/security/notices/USN-5513-1
https://www.cve.org/CVERecord?id=CVE-2021-3609
https://www.openwall.com/lists/oss-security/2021/06/19/1
|
| kernel-headers |
CVE-2021-3612 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-3612
https://bugzilla.redhat.com/show_bug.cgi?id=1974079
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3612.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/
https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82%40gmail.com/
https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/
https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-3612
https://security.netapp.com/advisory/ntap-20210805-0005/
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5071-1
https://ubuntu.com/security/notices/USN-5071-2
https://ubuntu.com/security/notices/USN-5071-3
https://ubuntu.com/security/notices/USN-5073-1
https://ubuntu.com/security/notices/USN-5073-2
https://ubuntu.com/security/notices/USN-5073-3
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5106-1
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.cve.org/CVERecord?id=CVE-2021-3612
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2021-3640 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2021-3640
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://errata.rockylinux.org/RLSA-2022:7683
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951
https://linux-qa.oracle.com/cve/CVE-2021-3640.html
https://linux-qa.oracle.com/errata/ELSA-2022-9151.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lkml.org/lkml/2021/8/28/238
https://nvd.nist.gov/vuln/detail/CVE-2021-3640
https://security.netapp.com/advisory/ntap-20220419-0003/
https://ubuntu.com/security/CVE-2021-3640
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5267-1
https://ubuntu.com/security/notices/USN-5267-3
https://ubuntu.com/security/notices/USN-5268-1
https://www.cve.org/CVERecord?id=CVE-2021-3640
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/07/22/1
https://x-lore.kernel.org/all/15f5a46.b79d9.17ba6802ccd.Coremail.linma@zju.edu.cn/
https://x-lore.kernel.org/all/20210810041410.142035-1-desmondcheongzx@gmail.com/
https://x-lore.kernel.org/all/20210828161818.31141-1-tiwai@suse.de/
|
| kernel-headers |
CVE-2021-3655 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-3655
https://bugzilla.redhat.com/show_bug.cgi?id=1984024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f9beb95e6a2669fa35e34a6ff52808b181efa20f
https://linux.oracle.com/cve/CVE-2021-3655.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/netdev/599e6c1fdcc50f16597380118c9b3b6790241d50.1627439903.git.marcelo.leitner@gmail.com/
https://lore.kernel.org/netdev/e39b372644b6e5bf48df25e54b9172f34ec223a1.1624904195.git.marcelo.leitner@gmail.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-3655
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://www.cve.org/CVERecord?id=CVE-2021-3655
|
| kernel-headers |
CVE-2021-3669 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-3669
https://bugzilla.redhat.com/show_bug.cgi?id=1980619
https://bugzilla.redhat.com/show_bug.cgi?id=1986473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3669.html
https://linux.oracle.com/errata/ELSA-2022-9829.html
https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-3669
https://security-tracker.debian.org/tracker/CVE-2021-3669
https://ubuntu.com/security/notices/USN-5924-1
https://ubuntu.com/security/notices/USN-5927-1
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-5980-1
https://ubuntu.com/security/notices/USN-5981-1
https://ubuntu.com/security/notices/USN-5984-1
https://ubuntu.com/security/notices/USN-5985-1
https://ubuntu.com/security/notices/USN-5991-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6009-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://ubuntu.com/security/notices/USN-6020-1
https://ubuntu.com/security/notices/USN-6030-1
https://ubuntu.com/security/notices/USN-6151-1
https://www.cve.org/CVERecord?id=CVE-2021-3669
|
| kernel-headers |
CVE-2021-3714 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-3714
https://arxiv.org/abs/2111.08553
https://arxiv.org/pdf/2111.08553.pdf
https://bugzilla.redhat.com/show_bug.cgi?id=1931327
https://nvd.nist.gov/vuln/detail/CVE-2021-3714
https://www.cve.org/CVERecord?id=CVE-2021-3714
|
| kernel-headers |
CVE-2021-37159 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-37159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-37159.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lore.kernel.org/linux-usb/20201002114323.GA3296553@kroah.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-37159
https://security.netapp.com/advisory/ntap-20210819-0003/
https://ubuntu.com/security/notices/USN-5092-1
https://ubuntu.com/security/notices/USN-5092-2
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.cve.org/CVERecord?id=CVE-2021-37159
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.spinics.net/lists/linux-usb/msg202228.html
|
| kernel-headers |
CVE-2021-3744 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/09/14/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-3744
https://bugzilla.redhat.com/show_bug.cgi?id=2000627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680
https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0
https://linux.oracle.com/cve/CVE-2021-3744.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-3744
https://seclists.org/oss-sec/2021/q3/164
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
https://www.cve.org/CVERecord?id=CVE-2021-3744
https://www.debian.org/security/2022/dsa-5096
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2021-3753 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-3753
https://bugzilla.redhat.com/show_bug.cgi?id=1999589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753
https://git.kernel.org/linus/2287a51ba822384834dafc1c798453375d1107c7
https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7
https://linux.oracle.com/cve/CVE-2021-3753.html
https://linux.oracle.com/errata/ELSA-2022-9088.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3753
https://security.netapp.com/advisory/ntap-20221028-0003/
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5117-1
https://ubuntu.com/security/notices/USN-5136-1
https://ubuntu.com/security/notices/USN-5137-1
https://ubuntu.com/security/notices/USN-5137-2
https://ubuntu.com/security/notices/USN-6221-1
https://www.cve.org/CVERecord?id=CVE-2021-3753
https://www.openwall.com/lists/oss-security/2021/09/01/4
|
| kernel-headers |
CVE-2021-3764 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-3764
https://bugzilla.redhat.com/show_bug.cgi?id=1997467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe
https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680
https://linux.oracle.com/cve/CVE-2021-3764.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3764
https://security-tracker.debian.org/tracker/CVE-2021-3764
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5161-1
https://ubuntu.com/security/notices/USN-5162-1
https://ubuntu.com/security/notices/USN-5163-1
https://ubuntu.com/security/notices/USN-5164-1
https://www.cve.org/CVERecord?id=CVE-2021-3764
|
| kernel-headers |
CVE-2021-3772 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-3772
https://bugzilla.redhat.com/show_bug.cgi?id=2000694
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df
https://linux.oracle.com/cve/CVE-2021-3772.html
https://linux.oracle.com/errata/ELSA-2022-9260.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3772
https://security.netapp.com/advisory/ntap-20221007-0001/
https://ubuntu.com/security/CVE-2021-3772
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2021-3772
https://www.debian.org/security/2022/dsa-5096
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2021-3773 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-3773
https://bugzilla.redhat.com/show_bug.cgi?id=2004949
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2021-3773.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3773
https://www.cve.org/CVERecord?id=CVE-2021-3773
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2021-39636 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-39636
https://android.googlesource.com/kernel/common/+/823f05d71506017aa4d47ae8b9546081686098fe
https://android.googlesource.com/kernel/common/+/8a1b3c7bd71ef1e7a4537216858dbe7d13eec6ed
https://android.googlesource.com/kernel/common/+/bb5bc03a5056b4b22f00b7333c42c861b83ef19f
https://android.googlesource.com/kernel/common/+/d104670ce30b9f910f39fbaad3ec59f87fa43468
https://android.googlesource.com/kernel/common/+/dcd0c8c3e87cf08344e169fdb94eb7ec96c3c32a
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39636
https://nvd.nist.gov/vuln/detail/CVE-2021-39636
https://source.android.com/security/bulletin/pixel/2021-12-01
https://ubuntu.com/security/notices/USN-5361-1
https://www.cve.org/CVERecord?id=CVE-2021-39636
|
| kernel-headers |
CVE-2021-39713 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
https://access.redhat.com/security/cve/CVE-2021-39713
https://android.googlesource.com/kernel/common/+/3a7d0d07a3867
https://android.googlesource.com/kernel/common/+/6f99528e97977
https://android.googlesource.com/kernel/common/+/86bd446b5cebd
https://android.googlesource.com/kernel/common/+/9d7e82cec35c0
https://android.googlesource.com/kernel/common/+/e368fdb61d8e7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39713
https://source.android.com/security/bulletin/pixel/2022-03-01
https://syzkaller.appspot.com/bug?id=d7e411c5472dd5da33d8cc921ccadc747743a568
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5484-1
https://www.cve.org/CVERecord?id=CVE-2021-39713
|
| kernel-headers |
CVE-2021-4002 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-4002
https://bugzilla.redhat.com/show_bug.cgi?id=2025726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890
https://linux.oracle.com/cve/CVE-2021-4002.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-4002
https://ubuntu.com/security/notices/USN-5206-1
https://ubuntu.com/security/notices/USN-5207-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5211-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.cve.org/CVERecord?id=CVE-2021-4002
https://www.debian.org/security/2022/dsa-5096
https://www.openwall.com/lists/oss-security/2021/11/25/1
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2021-4032 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-4032
https://bugzilla.redhat.com/show_bug.cgi?id=2027403
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7d8a19f9a056a05c5c509fa65af472a322abfee
https://lkml.org/lkml/2021/9/8/587
https://nvd.nist.gov/vuln/detail/CVE-2021-4032
https://www.cve.org/CVERecord?id=CVE-2021-4032
|
| kernel-headers |
CVE-2021-40490 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-40490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490
https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa
https://linux.oracle.com/cve/CVE-2021-40490.html
https://linux.oracle.com/errata/ELSA-2021-9488.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/
https://lore.kernel.org/linux-ext4/000000000000e5080305c9e51453@google.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-40490
https://security.netapp.com/advisory/ntap-20211004-0001/
https://ubuntu.com/security/notices/USN-5096-1
https://ubuntu.com/security/notices/USN-5113-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5115-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5120-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.cve.org/CVERecord?id=CVE-2021-40490
https://www.debian.org/security/2021/dsa-4978
|
| kernel-headers |
CVE-2021-4148 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-4148
https://bugzilla.redhat.com/show_bug.cgi?id=2026487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148
https://lkml.org/lkml/2021/9/12/323
https://lkml.org/lkml/2021/9/17/1037
https://lore.kernel.org/linux-mm/a07564a3-b2fc-9ffe-3ace-3f276075ea5c@google.com/
https://lore.kernel.org/lkml/CACkBjsYwLYLRmX8GpsDpMthagWOjWWrNxqY6ZLNQVr6yx+f5vA@mail.gmail.com/
https://lore.kernel.org/lkml/CAHbLzkrdGva2dzO36r62LKv_ip5trbMK0BO3vCeSBk2_7OE-zA@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-4148
https://www.cve.org/CVERecord?id=CVE-2021-4148
|
| kernel-headers |
CVE-2021-4149 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-4149
https://bugzilla.redhat.com/show_bug.cgi?id=2026485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149
https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6)
https://linux.oracle.com/cve/CVE-2021-4149.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
https://lkml.org/lkml/2021/10/18/885
https://lkml.org/lkml/2021/9/13/2565
https://nvd.nist.gov/vuln/detail/CVE-2021-4149
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2021-4149
|
| kernel-headers |
CVE-2021-4157 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-4157
https://bugzilla.redhat.com/show_bug.cgi?id=2034342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4157
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/ed34695e15aba74f45247f1ee2cf7e09d449f925 (5.13-rc1)
https://linux.oracle.com/cve/CVE-2021-4157.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lore.kernel.org/lkml/20210517140244.822185482%40linuxfoundation.org/
https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2021-4157
https://security.netapp.com/advisory/ntap-20220602-0007/
https://ubuntu.com/security/notices/USN-5413-1
https://www.cve.org/CVERecord?id=CVE-2021-4157
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2021-4159 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-4159
https://bugzilla.redhat.com/show_bug.cgi?id=2036024
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2021-4159
https://security-tracker.debian.org/tracker/CVE-2021-4159
https://ubuntu.com/security/notices/USN-5668-1
https://ubuntu.com/security/notices/USN-5677-1
https://ubuntu.com/security/notices/USN-5682-1
https://ubuntu.com/security/notices/USN-5706-1
https://ubuntu.com/security/notices/USN-5790-1
https://www.cve.org/CVERecord?id=CVE-2021-4159
|
| kernel-headers |
CVE-2021-41864 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-41864
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a
https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a
https://linux.oracle.com/cve/CVE-2021-41864.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-41864
https://security.netapp.com/advisory/ntap-20211029-0004/
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5140-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5209-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.cve.org/CVERecord?id=CVE-2021-41864
https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers |
CVE-2021-4203 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-4203
https://bugs.chromium.org/p/project-zero/issues/detail?id=2230
https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1
https://bugzilla.redhat.com/show_bug.cgi?id=2036934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/35306eb23814444bd4021f8a1c3047d3cb0c8b2b (5.15-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814
https://linux.oracle.com/cve/CVE-2021-4203.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet%40gmail.com/T/
https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-4203
https://security.netapp.com/advisory/ntap-20221111-0003/
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2021-4203
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2021-4204 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-4204
https://bugzilla.redhat.com/show_bug.cgi?id=2039178
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/impish/commit/?id=53fb7741ff9d546174dbb585957b4f8b6afbdb83
https://nvd.nist.gov/vuln/detail/CVE-2021-4204
https://security-tracker.debian.org/tracker/CVE-2021-4204
https://security.netapp.com/advisory/ntap-20221228-0003/
https://ubuntu.com/security/notices/USN-5217-1
https://ubuntu.com/security/notices/USN-5218-1
https://ubuntu.com/security/notices/USN-5219-1
https://www.cve.org/CVERecord?id=CVE-2021-4204
https://www.openwall.com/lists/oss-security/2022/01/11/4
|
| kernel-headers |
CVE-2021-43056 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/10/28/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-43056
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 (5.15-rc6)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337
https://linux.oracle.com/cve/CVE-2021-43056.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AA7EAPPKWG4LMTQQLNNSKATY6ST2KQFE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BBM4FP3IT3JZ2O7EBS7TEOG657N4ZGRE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RRAIS3PG4EV5WFLYESR6FXWM4BJJGWVA/
https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf%40mpe.ellerman.id.au/T/#u
https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf@mpe.ellerman.id.au/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-43056
https://ubuntu.com/security/notices/USN-5139-1
https://ubuntu.com/security/notices/USN-5165-1
https://ubuntu.com/security/notices/USN-5208-1
https://ubuntu.com/security/notices/USN-5210-1
https://ubuntu.com/security/notices/USN-5218-1
https://www.cve.org/CVERecord?id=CVE-2021-43056
|
| kernel-headers |
CVE-2021-43975 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2021-43975
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496
https://linux.oracle.com/cve/CVE-2021-43975.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify%40kernel.org/T/
https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-43975
https://security.netapp.com/advisory/ntap-20211210-0001/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5294-1
https://ubuntu.com/security/notices/USN-5294-2
https://ubuntu.com/security/notices/USN-5297-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5368-1
https://ubuntu.com/security/notices/USN-5385-1
https://www.cve.org/CVERecord?id=CVE-2021-43975
https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers |
CVE-2021-43976 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-43976
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84
https://linux.oracle.com/cve/CVE-2021-43976.html
https://linux.oracle.com/errata/ELSA-2022-9852.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://nvd.nist.gov/vuln/detail/CVE-2021-43976
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+%40Zekuns-MBP-16.fios-router.home/
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/
https://security.netapp.com/advisory/ntap-20211210-0001/
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5338-1
https://ubuntu.com/security/notices/USN-5339-1
https://ubuntu.com/security/notices/USN-5361-1
https://ubuntu.com/security/notices/USN-5377-1
https://ubuntu.com/security/notices/USN-5383-1
https://www.cve.org/CVERecord?id=CVE-2021-43976
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2021-45485 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-45485
https://arxiv.org/pdf/2112.09604.pdf
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/62f20e068ccc50d6ab66fdb72ba90da2b9418c99 (5.14-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99
https://linux.oracle.com/cve/CVE-2021-45485.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/
https://nvd.nist.gov/vuln/detail/CVE-2021-45485
https://security.netapp.com/advisory/ntap-20220121-0001/
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.cve.org/CVERecord?id=CVE-2021-45485
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2021-45486 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2021-45486
https://arxiv.org/pdf/2112.09604.pdf
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45486
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba (5.13-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba
https://linux.oracle.com/cve/CVE-2021-45486.html
https://linux.oracle.com/errata/ELSA-2022-9852.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45486
https://ubuntu.com/security/notices/USN-5361-1
https://www.cve.org/CVERecord?id=CVE-2021-45486
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2021-45868 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-45868
https://bugzilla.kernel.org/show_bug.cgi?id=214655
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45868
https://git.kernel.org/linus/9bf3d20331295b1ecb81f4ed9ef358c51699a050
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050
https://linux.oracle.com/cve/CVE-2021-45868.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://nvd.nist.gov/vuln/detail/CVE-2021-45868
https://security.netapp.com/advisory/ntap-20220419-0003/
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2021-45868
https://www.openwall.com/lists/oss-security/2022/03/17/1
https://www.openwall.com/lists/oss-security/2022/03/17/2
|
| kernel-headers |
CVE-2021-46904 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46904
https://git.kernel.org/stable/c/145c89c441d27696961752bf51b323f347601bee
https://git.kernel.org/stable/c/388d05f70f1ee0cac4a2068fd295072f1a44152a
https://git.kernel.org/stable/c/4a2933c88399c0ebc738db39bbce3ae89786d723
https://git.kernel.org/stable/c/8a12f8836145ffe37e9c8733dce18c22fb668b66
https://git.kernel.org/stable/c/92028d7a31e55d53e41cff679156b9432cffcb36
https://git.kernel.org/stable/c/a462067d7c8e6953a733bf5ade8db947b1bb5449
https://git.kernel.org/stable/c/caf5ac93b3b5d5fac032fc11fbea680e115421b4
https://git.kernel.org/stable/c/dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac
https://nvd.nist.gov/vuln/detail/CVE-2021-46904
https://www.cve.org/CVERecord?id=CVE-2021-46904
|
| kernel-headers |
CVE-2021-46905 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46905
https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00
https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3
https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef
https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725
https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273
https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e
https://nvd.nist.gov/vuln/detail/CVE-2021-46905
https://www.cve.org/CVERecord?id=CVE-2021-46905
|
| kernel-headers |
CVE-2021-46906 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46906
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://lore.kernel.org/linux-cve-announce/2024022603-CVE-2021-46906-636c@gregkh/
https://nvd.nist.gov/vuln/detail/CVE-2021-46906
https://www.cve.org/CVERecord?id=CVE-2021-46906
|
| kernel-headers |
CVE-2021-46907 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46907
https://git.kernel.org/stable/c/04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a
https://git.kernel.org/stable/c/7f64753835a78c7d2cc2932a5808ef3b7fd4c050
https://git.kernel.org/stable/c/ce541d7b59566a0d94c7c99bfb5d34b050e6af70
https://lore.kernel.org/linux-cve-announce/2024022703-CVE-2021-46907-85de@gregkh/
https://nvd.nist.gov/vuln/detail/CVE-2021-46907
https://www.cve.org/CVERecord?id=CVE-2021-46907
|
| kernel-headers |
CVE-2021-46908 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46908
https://git.kernel.org/stable/c/4ccdc6c6cae38b91c871293fb0ed8c6845a61b51
https://git.kernel.org/stable/c/4f3ff11204eac0ee23acf64deecb3bad7b0db0c6
https://git.kernel.org/stable/c/9601148392520e2e134936e76788fc2a6371e7be
https://nvd.nist.gov/vuln/detail/CVE-2021-46908
https://www.cve.org/CVERecord?id=CVE-2021-46908
|
| kernel-headers |
CVE-2021-46909 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46909
https://git.kernel.org/stable/c/1fc087fdb98d556b416c82ed6e3964a30885f47a
https://git.kernel.org/stable/c/2643da6aa57920d9159a1a579fb04f89a2b0d29a
https://git.kernel.org/stable/c/30e3b4f256b4e366a61658c294f6a21b8626dda7
https://git.kernel.org/stable/c/532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf
https://git.kernel.org/stable/c/871b569a3e67f570df9f5ba195444dc7c621293b
https://git.kernel.org/stable/c/c3efce8cc9807339633ee30e39882f4c8626ee1d
https://nvd.nist.gov/vuln/detail/CVE-2021-46909
https://www.cve.org/CVERecord?id=CVE-2021-46909
|
| kernel-headers |
CVE-2021-46910 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46910
https://git.kernel.org/stable/c/5965ac11b1d5fcb38464728931649cd9df79c7c9
https://git.kernel.org/stable/c/d624833f5984d484c5e3196f34b926f9e71dafee
https://nvd.nist.gov/vuln/detail/CVE-2021-46910
https://www.cve.org/CVERecord?id=CVE-2021-46910
|
| kernel-headers |
CVE-2021-46913 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46913
https://git.kernel.org/stable/c/47d8de3c226574a3ddb8b87d0c152028d1bafef4
https://git.kernel.org/stable/c/4d8f9065830e526c83199186c5f56a6514f457d2
https://git.kernel.org/stable/c/e51ff3ffc316377cca21de8b80404eed0c37b3c3
https://lore.kernel.org/linux-cve-announce/2024022708-CVE-2021-46913-eeef@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46913
https://www.cve.org/CVERecord?id=CVE-2021-46913
|
| kernel-headers |
CVE-2021-46915 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46915
https://git.kernel.org/stable/c/01fb1626b620cb37a65ad08e0f626489e8f042ef
https://git.kernel.org/stable/c/1bb3ee4259936cc3b2d80a4a480bbb4868575071
https://git.kernel.org/stable/c/9065ccb9ec92c5120e7e97958397ebdb454f23d6
https://git.kernel.org/stable/c/b895bdf5d643b6feb7c60856326dd4feb6981560
https://git.kernel.org/stable/c/dc1732baa9da5b68621586bf8636ebbc27dc62d2
https://git.kernel.org/stable/c/fadd3c4afdf3d4c21f4d138502f8b76334987e26
https://lore.kernel.org/linux-cve-announce/2024022709-CVE-2021-46915-7ded@gregkh/
https://nvd.nist.gov/vuln/detail/CVE-2021-46915
https://www.cve.org/CVERecord?id=CVE-2021-46915
|
| kernel-headers |
CVE-2021-46916 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46916
https://git.kernel.org/stable/c/31166efb1cee348eb6314e9c0095d84cbeb66b9d
https://git.kernel.org/stable/c/758d19098df4b0bbca9f40d6ae6c82c9c18b9bba
https://nvd.nist.gov/vuln/detail/CVE-2021-46916
https://www.cve.org/CVERecord?id=CVE-2021-46916
|
| kernel-headers |
CVE-2021-46917 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46917
https://git.kernel.org/stable/c/e5eb9757fe4c2392e069246ae78badc573af1833
https://git.kernel.org/stable/c/ea9aadc06a9f10ad20a90edc0a484f1147d88a7a
https://git.kernel.org/stable/c/f7dc8f5619165e1fa3383d0c2519f502d9e2a1a9
https://nvd.nist.gov/vuln/detail/CVE-2021-46917
https://www.cve.org/CVERecord?id=CVE-2021-46917
|
| kernel-headers |
CVE-2021-46918 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46918
https://git.kernel.org/stable/c/6df0e6c57dfc064af330071f372f11aa8c584997
https://git.kernel.org/stable/c/c84b8982d7aa9b4717dc36a1c6cbc93ee153b500
https://nvd.nist.gov/vuln/detail/CVE-2021-46918
https://www.cve.org/CVERecord?id=CVE-2021-46918
|
| kernel-headers |
CVE-2021-46919 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46919
https://git.kernel.org/stable/c/05b7791c4c4aa8304368fdc55ae911f6b34e7281
https://git.kernel.org/stable/c/0fff71c5a311e1264988179f7dcc217fda15fadd
https://git.kernel.org/stable/c/4ecf25595273203010bc8318c4aee60ad64037ae
https://nvd.nist.gov/vuln/detail/CVE-2021-46919
https://www.cve.org/CVERecord?id=CVE-2021-46919
|
| kernel-headers |
CVE-2021-46920 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46920
https://git.kernel.org/stable/c/02981a44a0e402089775416371bd2e0c935685f8
https://git.kernel.org/stable/c/a5ad12d5d69c63af289a37f05187a0c6fe93553d
https://git.kernel.org/stable/c/ea941ac294d75d0ace50797aebf0056f6f8f7a7f
https://nvd.nist.gov/vuln/detail/CVE-2021-46920
https://www.cve.org/CVERecord?id=CVE-2021-46920
|
| kernel-headers |
CVE-2021-46921 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46921
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://lore.kernel.org/linux-cve-announce/2024022732-CVE-2021-46921-91dc@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46921
https://www.cve.org/CVERecord?id=CVE-2021-46921
|
| kernel-headers |
CVE-2021-46929 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46929
https://git.kernel.org/stable/c/5ec7d18d1813a5bead0b495045606c93873aecbb
https://git.kernel.org/stable/c/75799e71df1da11394740b43ae5686646179561d
https://git.kernel.org/stable/c/769d14abd35e0e153b5149c3e1e989a9d719e3ff
https://git.kernel.org/stable/c/831de271452b87657fcf8d715ee20519b79caef5
https://git.kernel.org/stable/c/8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e
https://git.kernel.org/stable/c/af6e6e58f7ebf86b4e7201694b1e4f3a62cbc3ec
https://lore.kernel.org/linux-cve-announce/2024022749-CVE-2021-46929-9369@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46929
https://www.cve.org/CVERecord?id=CVE-2021-46929
|
| kernel-headers |
CVE-2021-46932 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46932
https://git.kernel.org/stable/c/292d2ac61fb0d9276a0f7b7ce4f50426f2a1c99f
https://git.kernel.org/stable/c/975774ea7528b489930b76a77ffc4d5379b95ff2
https://git.kernel.org/stable/c/9f329d0d6c91142cf0ad08d23c72dd195db2633c
https://git.kernel.org/stable/c/9f3ccdc3f6ef10084ceb3a47df0961bec6196fd0
https://git.kernel.org/stable/c/a02e1404e27855089d2b0a0acc4652c2ce65fe46
https://git.kernel.org/stable/c/d1962f263a176f493400b8f91bfbf2bfedce951e
https://git.kernel.org/stable/c/d2cb2bf39a6d17ef4bdc0e59c1a35cf5751ad8f4
https://git.kernel.org/stable/c/e79ff8c68acb1eddf709d3ac84716868f2a91012
https://lore.kernel.org/linux-cve-announce/2024022750-CVE-2021-46932-3a36@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46932
https://www.cve.org/CVERecord?id=CVE-2021-46932
|
| kernel-headers |
CVE-2021-46935 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46935
https://git.kernel.org/stable/c/103b16a8c51f96d5fe063022869ea906c256e5da
https://git.kernel.org/stable/c/17691bada6b2f1d5f1c0f6d28cd9d0727023b0ff
https://git.kernel.org/stable/c/1cb8444f3114f0bb2f6e3bcadcf09aa4a28425d4
https://git.kernel.org/stable/c/2d2df539d05205fd83c404d5f2dff48d36f9b495
https://git.kernel.org/stable/c/7c7064402609aeb6fb11be1b4ec10673ff17b593
https://git.kernel.org/stable/c/cfd0d84ba28c18b531648c9d4a35ecca89ad9901
https://lore.kernel.org/linux-cve-announce/2024022751-CVE-2021-46935-f8f4@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46935
https://www.cve.org/CVERecord?id=CVE-2021-46935
|
| kernel-headers |
CVE-2021-46936 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46936
https://git.kernel.org/stable/c/08eacbd141e2495d2fcdde84358a06c4f95cbb13
https://git.kernel.org/stable/c/15579e1301f856ad9385d720c9267c11032a5022
https://git.kernel.org/stable/c/2386e81a1d277f540e1285565c9d41d531bb69d4
https://git.kernel.org/stable/c/5c2fe20ad37ff56070ae0acb34152333976929b4
https://git.kernel.org/stable/c/a8e1944b44f94f5c5f530e434c5eaee787254566
https://git.kernel.org/stable/c/e22e45fc9e41bf9fcc1e92cfb78eb92786728ef0
https://git.kernel.org/stable/c/e73164e89d1be561228a4534e1091369ee4ba41a
https://git.kernel.org/stable/c/fe5838c22b986c1190f1dce9aa09bf6a491c1a69
https://lore.kernel.org/linux-cve-announce/2024022751-CVE-2021-46936-2f8a@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46936
https://www.cve.org/CVERecord?id=CVE-2021-46936
|
| kernel-headers |
CVE-2021-46937 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46937
https://git.kernel.org/stable/c/ebb3f994dd92f8fb4d70c7541091216c1e10cb71
https://git.kernel.org/stable/c/ffe4a1ba1a82c416a6b3a09d46594f6a885ae141
https://lore.kernel.org/linux-cve-announce/2024022751-CVE-2021-46937-3ae8@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46937
https://www.cve.org/CVERecord?id=CVE-2021-46937
|
| kernel-headers |
CVE-2021-46938 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46938
https://git.kernel.org/stable/c/1cb02dc76f4c0a2749a02b26469512d6984252e9
https://git.kernel.org/stable/c/6086f957416a6e87236c06079fcaba7a3998aeca
https://git.kernel.org/stable/c/772b9f59657665af3b68d24d12b9d172d31f0dfb
https://git.kernel.org/stable/c/8ae0185255eaf05bd66f4215c81e99bf01140fd9
https://git.kernel.org/stable/c/8e947c8f4a5620df77e43c9c75310dc510250166
https://git.kernel.org/stable/c/a992a283c0b77d0a7c2c348add0e6a21fb1dab67
https://git.kernel.org/stable/c/b42c0a33dfdd451d9be62dd5de58c39f2750b6e3
https://git.kernel.org/stable/c/d757bf4c69cda3c3ab7f775dfabbf5a80e2f6f9d
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-3-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46938
https://www.cve.org/CVERecord?id=CVE-2021-46938
|
| kernel-headers |
CVE-2021-46939 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46939
https://git.kernel.org/stable/c/1fca00920327be96f3318224f502e4d5460f9545
https://git.kernel.org/stable/c/2a1bd74b8186d7938bf004f5603f25b84785f63e
https://git.kernel.org/stable/c/6e2418576228eeb12e7ba82edb8f9500623942ff
https://git.kernel.org/stable/c/859b47a43f5a0e5b9a92b621dc6ceaad39fb5c8b
https://git.kernel.org/stable/c/91ca6f6a91f679c8645d7f3307e03ce86ad518c4
https://git.kernel.org/stable/c/a33614d52e97fc8077eb0b292189ca7d964cc534
https://git.kernel.org/stable/c/aafe104aa9096827a429bc1358f8260ee565b7cc
https://git.kernel.org/stable/c/c64da3294a7d59a4bf6874c664c13be892f15f44
https://git.kernel.org/stable/c/d43d56dbf452ccecc1ec735cd4b6840118005d7c
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-4-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46939
https://www.cve.org/CVERecord?id=CVE-2021-46939
|
| kernel-headers |
CVE-2021-46942 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46942
https://git.kernel.org/stable/c/734551df6f9bedfbefcd113ede665945e9de0b99
https://git.kernel.org/stable/c/cb5e0b3d0f993a6268c1a2c7ede2f9aa0c17ef68
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-7-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46942
https://www.cve.org/CVERecord?id=CVE-2021-46942
|
| kernel-headers |
CVE-2021-46943 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46943
https://git.kernel.org/stable/c/34892ea938387d83ffcfb7775ec55f0f80767916
https://git.kernel.org/stable/c/6fb617e37a39db0a3eca4489431359d0bdf3b9bc
https://git.kernel.org/stable/c/a03fb1e8a110658215a4cefc3e2ad53279e496a6
https://git.kernel.org/stable/c/ad91849996f9dd79741a961fd03585a683b08356
https://git.kernel.org/stable/c/c6b81b897f6f9445d57f8d47c4e060ec21556137
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-8-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46943
https://www.cve.org/CVERecord?id=CVE-2021-46943
|
| kernel-headers |
CVE-2021-46945 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46945
https://git.kernel.org/stable/c/1e9ea8f4637026b8e965128953f2da061ccae9c4
https://git.kernel.org/stable/c/64e1eebe2131183174f4fbb6b1491355f96c6cde
https://git.kernel.org/stable/c/ac2f7ca51b0929461ea49918f27c11b680f28995
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-10-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46945
https://www.cve.org/CVERecord?id=CVE-2021-46945
|
| kernel-headers |
CVE-2021-46946 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46946
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-11-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46946
https://www.cve.org/CVERecord?id=CVE-2021-46946
|
| kernel-headers |
CVE-2021-46950 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46950
https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5
https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd
https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd
https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515
https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382
https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40
https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-15-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46950
https://www.cve.org/CVERecord?id=CVE-2021-46950
|
| kernel-headers |
CVE-2021-46951 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46951
https://git.kernel.org/stable/c/2f12258b5224cfaa808c54fd29345f3c1cbfca76
https://git.kernel.org/stable/c/3818b753277f5ca0c170bf5b98e0a5a225542fcb
https://git.kernel.org/stable/c/48cff270b037022e37835d93361646205ca25101
https://git.kernel.org/stable/c/60a01ecc9f68067e4314a0b55148e39e5d58a51b
https://git.kernel.org/stable/c/ac07c557ca12ec9276c0375517bac7ae5be4e50c
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-16-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46951
https://www.cve.org/CVERecord?id=CVE-2021-46951
|
| kernel-headers |
CVE-2021-46952 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46952
https://git.kernel.org/stable/c/2f3380121d49e829fb73ba86240c181bc32ad897
https://git.kernel.org/stable/c/3d0163821c035040a46d816a42c0780f0f0a30a8
https://git.kernel.org/stable/c/96fa26b74cdcf9f5c98996bf36bec9fb5b19ffe2
https://git.kernel.org/stable/c/c09f11ef35955785f92369e25819bf0629df2e59
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-17-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46952
https://www.cve.org/CVERecord?id=CVE-2021-46952
|
| kernel-headers |
CVE-2021-46953 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46953
https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277
https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8
https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4
https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01
https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b
https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724
https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-18-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46953
https://www.cve.org/CVERecord?id=CVE-2021-46953
|
| kernel-headers |
CVE-2021-46954 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46954
https://git.kernel.org/stable/c/018bb8da5b5888e19585f9b802f036afe643fcef
https://git.kernel.org/stable/c/31fe34a0118e0acc958c802e830ad5d37ef6b1d3
https://git.kernel.org/stable/c/8e6dfb7beeb6489ac1365b8a71052e737f5da76e
https://lore.kernel.org/linux-cve-announce/2024022715-CVE-2021-46954-b856@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46954
https://www.cve.org/CVERecord?id=CVE-2021-46954
|
| kernel-headers |
CVE-2021-46955 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46955
https://git.kernel.org/stable/c/23e17ec1a5eb53fe39cc34fa5592686d5acd0dac
https://git.kernel.org/stable/c/490ad0a2390442d0a7b8c00972a83dbb09cab142
https://git.kernel.org/stable/c/5a52fa8ad45b5a593ed416adf326538638454ff1
https://git.kernel.org/stable/c/7c0ea5930c1c211931819d83cfb157bff1539a4c
https://git.kernel.org/stable/c/a1478374b0bda89b4277a8afd39208271faad4be
https://git.kernel.org/stable/c/b1d7280f9ba1bfdbc3af5bdb82e51f014854f26f
https://git.kernel.org/stable/c/b3502b04e84ac5349be95fc033c17bd701d2787a
https://git.kernel.org/stable/c/d841d3cf5297fde4ce6a41ff35451d0e82917f3e
https://git.kernel.org/stable/c/df9e900de24637be41879e2c50afb713ec4e8b2e
https://lore.kernel.org/linux-cve-announce/2024022718-CVE-2021-46955-b50b@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46955
https://www.cve.org/CVERecord?id=CVE-2021-46955
|
| kernel-headers |
CVE-2021-46956 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46956
https://git.kernel.org/stable/c/310efc95c72c13faf855c692d19cd4d054d827c8
https://git.kernel.org/stable/c/5116e79fc6e6725b8acdad8b7e928a83ab7b47e6
https://git.kernel.org/stable/c/9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae
https://git.kernel.org/stable/c/c79c5e0178922a9e092ec8fed026750f39dcaef4
https://git.kernel.org/stable/c/d19555ff225d0896a33246a49279e6d578095f15
https://lore.kernel.org/linux-cve-announce/2024022718-CVE-2021-46956-df60@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46956
https://www.cve.org/CVERecord?id=CVE-2021-46956
|
| kernel-headers |
CVE-2021-46958 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46958
https://git.kernel.org/stable/c/061dde8245356d8864d29e25207aa4daa0be4d3c
https://git.kernel.org/stable/c/633f7f216663587f17601eaa1cf2ac3d5654874c
https://git.kernel.org/stable/c/a4794be7b00b7eda4b45fffd283ab7d76df7e5d6
https://git.kernel.org/stable/c/e2da98788369bfba1138bada72765c47989a4338
https://lore.kernel.org/linux-cve-announce/2024022718-CVE-2021-46958-53ff@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46958
https://www.cve.org/CVERecord?id=CVE-2021-46958
|
| kernel-headers |
CVE-2021-46959 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46959
https://git.kernel.org/stable/c/001c8e83646ad3b847b18f6ac55a54367d917d74
https://git.kernel.org/stable/c/28a5529068c51cdf0295ab1e11a99a3a909a03e4
https://git.kernel.org/stable/c/62bb2c7f2411a0045c24831f11ecacfc35610815
https://git.kernel.org/stable/c/794aaf01444d4e765e2b067cba01cc69c1c68ed9
https://git.kernel.org/stable/c/8735248ebb918d25427965f0db07939ed0473ec6
https://git.kernel.org/stable/c/8bf96425c90f5c1dcf3b7b9df568019a1d4b8a0e
https://git.kernel.org/stable/c/8e029707f50a82c53172359c686b2536ab54e58c
https://git.kernel.org/stable/c/c7fabe372a9031acd00498bc718ce27c253abfd1
https://git.kernel.org/stable/c/cee78aa24578edac8cf00513dca618c0acc17cd7
https://lore.kernel.org/linux-cve-announce/2024022916-CVE-2021-46959-f517@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46959
https://www.cve.org/CVERecord?id=CVE-2021-46959
|
| kernel-headers |
CVE-2021-46966 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46966
https://git.kernel.org/stable/c/1d53ca5d131074c925ce38361fb0376d3bf7e394
https://git.kernel.org/stable/c/62dc2440ebb552aa0d7f635e1697e077d9d21203
https://git.kernel.org/stable/c/72814a94c38a33239793f7622cec6ace1e540c4b
https://git.kernel.org/stable/c/8b04d57f30caf76649d0567551589af9a66ca9be
https://git.kernel.org/stable/c/90575d1d9311b753cf1718f4ce9061ddda7dfd23
https://git.kernel.org/stable/c/a5b26a2e362f572d87e9fd35435680e557052a17
https://git.kernel.org/stable/c/b7a5baaae212a686ceb812c32fceed79c03c0234
https://git.kernel.org/stable/c/e483bb9a991bdae29a0caa4b3a6d002c968f94aa
https://git.kernel.org/stable/c/f16737caf41fc06cfe6e49048becb09657074d4b
https://lore.kernel.org/linux-cve-announce/2024022720-CVE-2021-46966-1469@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46966
https://www.cve.org/CVERecord?id=CVE-2021-46966
|
| kernel-headers |
CVE-2021-46971 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46971
https://git.kernel.org/stable/c/08ef1af4de5fe7de9c6d69f1e22e51b66e385d9b
https://git.kernel.org/stable/c/4348d3b5027bc3ff6336368b6c60605d4ef8e1ce
https://git.kernel.org/stable/c/b246759284d6a2bc5b6f1009caeeb3abce2ec9ff
https://git.kernel.org/stable/c/c7b0208ee370b89d20486fae71cd9abb759819c1
https://git.kernel.org/stable/c/f5809ca4c311b71bfaba6d13f4e39eab0557895e
https://lore.kernel.org/linux-cve-announce/2024022721-CVE-2021-46971-9534@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46971
https://www.cve.org/CVERecord?id=CVE-2021-46971
|
| kernel-headers |
CVE-2021-46972 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46972
https://git.kernel.org/stable/c/71d58457a8afc650da5d3292a7f7029317654d95
https://git.kernel.org/stable/c/cf3e3330bc5719fa9d658e3e2f596bde89344a94
https://git.kernel.org/stable/c/d587cfaef72b1b6f4b2774827123bce91f497cc8
https://git.kernel.org/stable/c/eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41
https://lore.kernel.org/linux-cve-announce/2024022721-CVE-2021-46972-2ec2@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46972
https://www.cve.org/CVERecord?id=CVE-2021-46972
|
| kernel-headers |
CVE-2021-46973 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46973
https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40
https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a
https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80
https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0
https://lore.kernel.org/linux-cve-announce/2024022721-CVE-2021-46973-20ce@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46973
https://www.cve.org/CVERecord?id=CVE-2021-46973
|
| kernel-headers |
CVE-2021-46974 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46974
https://git.kernel.org/stable/c/0e2dfdc74a7f4036127356d42ea59388f153f42c
https://git.kernel.org/stable/c/2cfa537674cd1051a3b8111536d77d0558f33d5d
https://git.kernel.org/stable/c/4d542ddb88fb2f39bf7f14caa2902f3e8d06f6ba
https://git.kernel.org/stable/c/53e0db429b37a32b8fc706d0d90eb4583ad13848
https://git.kernel.org/stable/c/6eba92a4d4be8feb4dc33976abac544fa99d6ecc
https://git.kernel.org/stable/c/7cf64d8679ca1cb20cf57d6a88bfee79a0922a66
https://git.kernel.org/stable/c/b9b34ddbe2076ade359cd5ce7537d5ed019e9807
https://lore.kernel.org/linux-cve-announce/2024022721-CVE-2021-46974-0852@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46974
https://www.cve.org/CVERecord?id=CVE-2021-46974
|
| kernel-headers |
CVE-2021-46975 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46975
https://git.kernel.org/stable/c/2671fa4dc0109d3fb581bc3078fdf17b5d9080f6
https://git.kernel.org/stable/c/671c54ea8c7ff47bd88444f3fffb65bf9799ce43
https://git.kernel.org/stable/c/68122479c128a929f8f7bdd951cfdc8dd0e75b8f
https://git.kernel.org/stable/c/9b288479f7a901a14ce703938596438559d7df55
https://git.kernel.org/stable/c/baea536cf51f8180ab993e374cb134b5edad25e2
https://git.kernel.org/stable/c/d3598eb3915cc0c0d8cab42f4a6258ff44c4033e
https://git.kernel.org/stable/c/da50f56e826e1db141693297afb99370ebc160dd
https://git.kernel.org/stable/c/fbf85a34ce17c4cf0a37ee253f4c582bbfb8231b
https://lore.kernel.org/linux-cve-announce/2024022721-CVE-2021-46975-248d@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46975
https://www.cve.org/CVERecord?id=CVE-2021-46975
|
| kernel-headers |
CVE-2021-46977 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46977
https://git.kernel.org/stable/c/31f29749ee970c251b3a7e5b914108425940d089
https://git.kernel.org/stable/c/5104d7ffcf24749939bea7fdb5378d186473f890
https://git.kernel.org/stable/c/5adcdeb57007ccf8ab7ac20bf787ffb6fafb1a94
https://git.kernel.org/stable/c/e3ea1895df719c4ef87862501bb10d95f4177bed
https://lore.kernel.org/linux-cve-announce/2024022822-CVE-2021-46977-76be@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46977
https://www.cve.org/CVERecord?id=CVE-2021-46977
|
| kernel-headers |
CVE-2021-46978 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46978
https://git.kernel.org/stable/c/200a45649ab7361bc80c70aebf7165b64f9a6c9f
https://git.kernel.org/stable/c/bd0e8455b85b651a4c77de9616e307129b15aaa7
https://git.kernel.org/stable/c/c8bf64e3fb77cc19bad146fbe26651985b117194
https://git.kernel.org/stable/c/f5c7e8425f18fdb9bdb7d13340651d7876890329
https://lore.kernel.org/linux-cve-announce/2024022822-CVE-2021-46978-3516@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46978
https://www.cve.org/CVERecord?id=CVE-2021-46978
|
| kernel-headers |
CVE-2021-46984 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46984
https://git.kernel.org/stable/c/0b6b4b90b74c27bea968c214d820ba4254b903a5
https://git.kernel.org/stable/c/2ef3c76540c49167a0bc3d5f80d00fd1fc4586df
https://git.kernel.org/stable/c/54dbe2d2c1fcabf650c7a8b747601da355cd7f9f
https://git.kernel.org/stable/c/a287cd84e047045f5a4d4da793414e848de627c6
https://git.kernel.org/stable/c/efed9a3337e341bd0989161b97453b52567bc59d
https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46984-e55e@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46984
https://www.cve.org/CVERecord?id=CVE-2021-46984
|
| kernel-headers |
CVE-2021-46987 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46987
https://git.kernel.org/stable/c/96157707c0420e3d3edfe046f1cc797fee117ade
https://git.kernel.org/stable/c/d5347827d0b4b2250cbce6eccaa1c81dc78d8651
https://git.kernel.org/stable/c/f9baa501b4fd6962257853d46ddffbc21f27e344
https://lore.kernel.org/linux-cve-announce/2024022825-CVE-2021-46987-f73f@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46987
https://www.cve.org/CVERecord?id=CVE-2021-46987
|
| kernel-headers |
CVE-2021-46988 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46988
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://lore.kernel.org/linux-cve-announce/2024022825-CVE-2021-46988-ae47@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46988
https://www.cve.org/CVERecord?id=CVE-2021-46988
|
| kernel-headers |
CVE-2021-46989 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46989
https://git.kernel.org/stable/c/52dde855663e5db824af51db39b5757d2ef3e28a
https://git.kernel.org/stable/c/97314e45aa1223a42d60256a62c5d9af54baf446
https://git.kernel.org/stable/c/adbd8a2a8cc05d9e501f93e5c95c59307874cc99
https://git.kernel.org/stable/c/c3187cf32216313fb316084efac4dab3a8459b1d
https://git.kernel.org/stable/c/c451a6bafb5f422197d31536f82116aed132b72c
https://git.kernel.org/stable/c/c477f62db1a0c0ecaa60a29713006ceeeb04b685
https://lore.kernel.org/linux-cve-announce/2024022825-CVE-2021-46989-8377@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46989
https://www.cve.org/CVERecord?id=CVE-2021-46989
|
| kernel-headers |
CVE-2021-46990 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46990
https://git.kernel.org/stable/c/0b4eb172cc12dc102cd0ad013e53ee4463db9508
https://git.kernel.org/stable/c/0c25a7bb697f2e6ee65b6d63782f675bf129511a
https://git.kernel.org/stable/c/2db22ba4e0e103f00e0512e0ecce36ac78c644f8
https://git.kernel.org/stable/c/5bc00fdda1e934c557351a9c751a205293e68cbf
https://git.kernel.org/stable/c/8382b15864e5014261b4f36c2aa89723612ee058
https://git.kernel.org/stable/c/aec86b052df6541cc97c5fca44e5934cbea4963b
https://git.kernel.org/stable/c/d2e3590ca39ccfd8a5a46d8c7f095cb6c7b9ae92
https://git.kernel.org/stable/c/dd0d6117052faace5440db20fc37175efe921c7d
https://git.kernel.org/stable/c/ee4b7aab93c2631c3bb0753023c5dda592bb666b
https://lore.kernel.org/linux-cve-announce/2024022825-CVE-2021-46990-5ab1@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46990
https://www.cve.org/CVERecord?id=CVE-2021-46990
|
| kernel-headers |
CVE-2021-46992 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46992
https://git.kernel.org/stable/c/1e8ab479cfbe5751efccedb95afb9b112a5ba475
https://git.kernel.org/stable/c/2824cafc6a93792d9ad85939c499161214d84c4b
https://git.kernel.org/stable/c/72b49dd116ca00a46a11d5a4d8d7987f05ed9cd7
https://git.kernel.org/stable/c/a388d10961ff8578b1a6691945d406c0f33aa71b
https://git.kernel.org/stable/c/a54754ec9891830ba548e2010c889e3c8146e449
https://git.kernel.org/stable/c/c77e2ef18167ad334e27610ced9a7f6af5ec1787
https://git.kernel.org/stable/c/efcd730ddd6f25578bd31bfe703e593e2421d708
https://lore.kernel.org/linux-cve-announce/2024022826-CVE-2021-46992-e8e8@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46992
https://www.cve.org/CVERecord?id=CVE-2021-46992
|
| kernel-headers |
CVE-2021-46993 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46993
https://git.kernel.org/stable/c/3da3f804b82a0a382d523a21acf4cf3bb35f936d
https://git.kernel.org/stable/c/42ee47c7e3569d9a0e2cb5053c496d97d380472f
https://git.kernel.org/stable/c/687f523c134b7f0bd040ee1230f6d17990d54172
https://git.kernel.org/stable/c/6d2f8909a5fabb73fe2a63918117943986c39b6c
https://git.kernel.org/stable/c/f7347c85490b92dd144fa1fba9e1eca501656ab3
https://lore.kernel.org/linux-cve-announce/2024022826-CVE-2021-46993-da22@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46993
https://www.cve.org/CVERecord?id=CVE-2021-46993
|
| kernel-headers |
CVE-2021-46995 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46995
https://git.kernel.org/stable/c/15f8f96ec7fc35024d4e03296e4d838fcea33d83
https://git.kernel.org/stable/c/4cc7faa406975b460aa674606291dea197c1210c
https://lore.kernel.org/linux-cve-announce/2024022827-CVE-2021-46995-6757@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46995
https://www.cve.org/CVERecord?id=CVE-2021-46995
|
| kernel-headers |
CVE-2021-46996 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46996
https://git.kernel.org/stable/c/2c784a500f5edd337258b0fdb2f31bc9abde1a23
https://git.kernel.org/stable/c/59fa98bfa1f4013d658d990cac88c87b46ff410c
https://git.kernel.org/stable/c/85dfd816fabfc16e71786eda0a33a7046688b5b0
https://git.kernel.org/stable/c/dd3bebf515f336214a91994348a2b86b9a1d3d7f
https://lore.kernel.org/linux-cve-announce/2024022827-CVE-2021-46996-0af4@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46996
https://www.cve.org/CVERecord?id=CVE-2021-46996
|
| kernel-headers |
CVE-2021-46999 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46999
https://git.kernel.org/stable/c/0bfd913c2121b3d553bfd52810fe6061d542d625
https://git.kernel.org/stable/c/35b4f24415c854cd718ccdf38dbea6297f010aae
https://git.kernel.org/stable/c/61b877bad9bb0d82b7d8841be50872557090a704
https://git.kernel.org/stable/c/b1b31948c0af44628e43353828453461bb74098f
https://git.kernel.org/stable/c/d624f2991b977821375fbd56c91b0c91d456a697
https://git.kernel.org/stable/c/f01988ecf3654f805282dce2d3bb9afe68d2691e
https://lore.kernel.org/linux-cve-announce/2024022828-CVE-2021-46999-d408@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46999
https://www.cve.org/CVERecord?id=CVE-2021-46999
|
| kernel-headers |
CVE-2021-47000 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47000
https://git.kernel.org/stable/c/0a219432127d396120fc88cabd82785e0ff72a2f
https://git.kernel.org/stable/c/1775c7ddacfcea29051c67409087578f8f4d751b
https://git.kernel.org/stable/c/22fa4c8288f1ec40f6d62d7a32c57ac176f9f0bc
https://git.kernel.org/stable/c/2ad8af2b70e986284050213230428b823b950a38
https://git.kernel.org/stable/c/bf45c9fe99aa8003d2703f1bd353f956dea47e40
https://lore.kernel.org/linux-cve-announce/2024022828-CVE-2021-47000-981a@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47000
https://www.cve.org/CVERecord?id=CVE-2021-47000
|
| kernel-headers |
CVE-2021-47001 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47001
https://git.kernel.org/stable/c/19b5fa9489b5706bc878c3a522a7f771079e2fa0
https://git.kernel.org/stable/c/35d8b10a25884050bb3b0149b62c3818ec59f77c
https://git.kernel.org/stable/c/8834ecb5df22b7ff3c9b0deba7726579bb613f95
https://git.kernel.org/stable/c/eddae8be7944096419c2ae29477a45f767d0fcd4
https://lore.kernel.org/linux-cve-announce/2024022828-CVE-2021-47001-0e51@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47001
https://www.cve.org/CVERecord?id=CVE-2021-47001
|
| kernel-headers |
CVE-2021-47002 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47002
https://git.kernel.org/stable/c/1e10f58f1c9a6b667b045513c7a4e6111c24fe7c
https://git.kernel.org/stable/c/b9f83ffaa0c096b4c832a43964fe6bff3acffe10
https://git.kernel.org/stable/c/c664aaec9aee544538a78ba4893a44bc73a6d742
https://lore.kernel.org/linux-cve-announce/2024022828-CVE-2021-47002-3946@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47002
https://www.cve.org/CVERecord?id=CVE-2021-47002
|
| kernel-headers |
CVE-2021-47004 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47004
https://git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d
https://git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63
https://git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff
https://git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db
https://lore.kernel.org/linux-cve-announce/2024022829-CVE-2021-47004-8544@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47004
https://www.cve.org/CVERecord?id=CVE-2021-47004
|
| kernel-headers |
CVE-2021-47006 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47006
https://git.kernel.org/stable/c/3ed8832aeaa9a37b0fc386bb72ff604352567c80
https://git.kernel.org/stable/c/555a70f7fff03bd669123487905c47ae27dbdaac
https://git.kernel.org/stable/c/630146203108bf6b8934eec0dfdb3e46dcb917de
https://git.kernel.org/stable/c/7eeacc6728c5478e3c01bc82a1f08958eaa12366
https://git.kernel.org/stable/c/a506bd5756290821a4314f502b4bafc2afcf5260
https://git.kernel.org/stable/c/a9938d6d78a238d6ab8de57a4d3dcf77adceb9bb
https://git.kernel.org/stable/c/dabe299425b1a53a69461fed7ac8922ea6733a25
https://git.kernel.org/stable/c/ed1f67465327cec4457bb988775245b199da86e6
https://lore.kernel.org/linux-cve-announce/2024022829-CVE-2021-47006-3312@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47006
https://www.cve.org/CVERecord?id=CVE-2021-47006
|
| kernel-headers |
CVE-2021-47007 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47007
https://git.kernel.org/stable/c/1c20a4896409f5ca1c770e1880c33d0a28a8b10f
https://git.kernel.org/stable/c/3ab0598e6d860ef49d029943ba80f627c15c15d6
https://git.kernel.org/stable/c/822054e5026c43b1dd60cf387dd999e95ee2ecc2
https://git.kernel.org/stable/c/860afd680d9cc1dabd61cda3cd246f60aa1eb705
https://lore.kernel.org/linux-cve-announce/2024022830-CVE-2021-47007-4d53@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47007
https://www.cve.org/CVERecord?id=CVE-2021-47007
|
| kernel-headers |
CVE-2021-47008 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47008
https://git.kernel.org/stable/c/a3ba26ecfb569f4aa3f867e80c02aa65f20aadad
https://git.kernel.org/stable/c/fb9e14f4f8217a0980f8da2c8ff70dee058cbe47
https://git.kernel.org/stable/c/fd722a57fe0b80133dacae4e1c852ee4212f9b2e
https://lore.kernel.org/linux-cve-announce/2024022830-CVE-2021-47008-3dc3@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47008
https://www.cve.org/CVERecord?id=CVE-2021-47008
|
| kernel-headers |
CVE-2021-47009 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47009
https://git.kernel.org/stable/c/1c4031014106aff48e1e686e40101c31eab5d44c
https://git.kernel.org/stable/c/31c9a4b24d86cbb36ff0d7a085725a3b4f0138c8
https://git.kernel.org/stable/c/3e24fbd37e72e8a67b74991970fecc82d14f57af
https://git.kernel.org/stable/c/83a775d5f9bfda95b1c295f95a3a041a40c7f321
https://lore.kernel.org/linux-cve-announce/2024022830-CVE-2021-47009-3f56@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47009
https://www.cve.org/CVERecord?id=CVE-2021-47009
|
| kernel-headers |
CVE-2021-47010 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47010
https://git.kernel.org/stable/c/6c1ea8bee75df8fe2184a50fcd0f70bf82986f42
https://git.kernel.org/stable/c/8d432592f30fcc34ef5a10aac4887b4897884493
https://git.kernel.org/stable/c/9884f745108f7d25b189bbcd6754e284fb29ab68
https://git.kernel.org/stable/c/992de06308d9a9584d59b96d294ac676f924e437
https://git.kernel.org/stable/c/e7d7bedd507bb732e600403b7a96f9fe48d0ca31
https://git.kernel.org/stable/c/efe1532a6e1a8e3c343d04fff510f0ed80328f9c
https://lore.kernel.org/linux-cve-announce/2024022830-CVE-2021-47010-6853@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47010
https://www.cve.org/CVERecord?id=CVE-2021-47010
|
| kernel-headers |
CVE-2021-47011 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47011
https://git.kernel.org/stable/c/31df8bc4d3feca9f9c6b2cd06fd64a111ae1a0e6
https://git.kernel.org/stable/c/89b1ed358e01e1b0417f5d3b0082359a23355552
https://git.kernel.org/stable/c/9f38f03ae8d5f57371b71aa6b4275765b65454fd
https://git.kernel.org/stable/c/c3ae6a3f3ca4f02f6ccddf213c027302586580d0
https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47011-5b75@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47011
https://www.cve.org/CVERecord?id=CVE-2021-47011
|
| kernel-headers |
CVE-2021-47014 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47014
https://git.kernel.org/stable/c/0648941f4c8bbf8b4b6c0b270889ae7aa769b921
https://git.kernel.org/stable/c/f77bd544a6bbe69aa50d9ed09f13494cf36ff806
https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47014-ffc7@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47014
https://www.cve.org/CVERecord?id=CVE-2021-47014
|
| kernel-headers |
CVE-2021-47015 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47015
https://git.kernel.org/stable/c/3fbc5bc651d688fbea2a59cdc91520a2f5334d0a
https://git.kernel.org/stable/c/4fcaad2b7dac3f16704f8118c7e481024ddbd3ed
https://git.kernel.org/stable/c/b1523e4ba293b2a32d9fabaf70c1dcaa6e3e2847
https://git.kernel.org/stable/c/bbd6f0a948139970f4a615dff189d9a503681a39
https://git.kernel.org/stable/c/e187ef83c04a5d23e68d39cfdff1a1931e29890c
https://lore.kernel.org/linux-cve-announce/2024022832-CVE-2021-47015-c2ae@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47015
https://www.cve.org/CVERecord?id=CVE-2021-47015
|
| kernel-headers |
CVE-2021-47017 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47017
https://git.kernel.org/stable/c/3b1ac40c6012140828caa79e592a438a18ebf71b
https://git.kernel.org/stable/c/5e413c0831ff4700d1739db3fa3ae9f859744676
https://git.kernel.org/stable/c/8392df5d7e0b6a7d21440da1fc259f9938f4dec3
https://git.kernel.org/stable/c/8bb054fb336f4250002fff4e0b075221c05c3c65
https://nvd.nist.gov/vuln/detail/CVE-2021-47017
https://www.cve.org/CVERecord?id=CVE-2021-47017
|
| kernel-headers |
CVE-2021-47018 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47018
https://git.kernel.org/stable/c/4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd
https://git.kernel.org/stable/c/9ccba66d4d2aff9a3909aa77d57ea8b7cc166f3c
https://git.kernel.org/stable/c/a84df7c80bdac598d6ac9268ae578da6928883e8
https://git.kernel.org/stable/c/abb07dc5e8b61ab7b1dde20dd73aa01a3aeb183f
https://nvd.nist.gov/vuln/detail/CVE-2021-47018
https://www.cve.org/CVERecord?id=CVE-2021-47018
|
| kernel-headers |
CVE-2021-47021 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47021
https://git.kernel.org/stable/c/81483309ce861a9fa7835322787f68a443fea364
https://git.kernel.org/stable/c/d754c80ae82a662e692a82faad71b8c218cb7f52
https://git.kernel.org/stable/c/e9d32af478cfc3744a45245c0b126738af4b3ac4
https://lore.kernel.org/linux-cve-announce/2024022833-CVE-2021-47021-6cbb@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47021
https://www.cve.org/CVERecord?id=CVE-2021-47021
|
| kernel-headers |
CVE-2021-47024 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47024
https://git.kernel.org/stable/c/27691665145e74a45034a9dccf1150cf1894763a
https://git.kernel.org/stable/c/37c38674ef2f8d7e8629e5d433c37d6c1273d16b
https://git.kernel.org/stable/c/8432b8114957235f42e070a16118a7f750de9d39
https://git.kernel.org/stable/c/b605673b523fe33abeafb2136759bcbc9c1e6ebf
https://lore.kernel.org/linux-cve-announce/2024022833-CVE-2021-47024-c116@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47024
https://www.cve.org/CVERecord?id=CVE-2021-47024
|
| kernel-headers |
CVE-2021-47036 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47036
https://git.kernel.org/stable/c/18f25dc399901426dff61e676ba603ff52c666f7
https://git.kernel.org/stable/c/450687386cd16d081b58cd7a342acff370a96078
https://lore.kernel.org/linux-cve-announce/2024022837-CVE-2021-47036-cd49@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47036
https://www.cve.org/CVERecord?id=CVE-2021-47036
|
| kernel-headers |
CVE-2021-47038 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47038
https://git.kernel.org/stable/c/17486960d79b900c45e0bb8fbcac0262848582ba
https://git.kernel.org/stable/c/332e69eb3bd90370f2d9f2c2ca7974ff523dea17
https://git.kernel.org/stable/c/7cc0ba67883c6c8d3bddb283f56c167fc837a555
https://git.kernel.org/stable/c/fee71f480bc1dec5f6ae3b0b185ff12a62bceabc
https://lore.kernel.org/linux-cve-announce/2024022837-CVE-2021-47038-bfcf@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47038
https://www.cve.org/CVERecord?id=CVE-2021-47038
|
| kernel-headers |
CVE-2021-47040 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47040
https://git.kernel.org/stable/c/38134ada0ceea3e848fe993263c0ff6207fd46e7
https://git.kernel.org/stable/c/51bf90901952aaac564bbdb36b2b503050c53dd9
https://git.kernel.org/stable/c/84b8c266c4bfe9ed5128e13253c388deb74b1b03
https://git.kernel.org/stable/c/cbbc13b115b8f18e0a714d89f87fbdc499acfe2d
https://lore.kernel.org/linux-cve-announce/2024022838-CVE-2021-47040-8722@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47040
https://www.cve.org/CVERecord?id=CVE-2021-47040
|
| kernel-headers |
CVE-2021-47041 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47041
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://lore.kernel.org/linux-cve-announce/2024022838-CVE-2021-47041-de92@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47041
https://www.cve.org/CVERecord?id=CVE-2021-47041
|
| kernel-headers |
CVE-2021-47044 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47044
https://git.kernel.org/stable/c/2f3eab368e313dba35fc2f51ede778bf7b030b54
https://git.kernel.org/stable/c/39a2a6eb5c9b66ea7c8055026303b3aa681b49a5
https://git.kernel.org/stable/c/805cea93e66ca7deaaf6ad3b67224ce47c104c2f
https://git.kernel.org/stable/c/80862cbf76c2646f709a57c4517aefe0b094c774
https://lore.kernel.org/linux-cve-announce/2024022839-CVE-2021-47044-2e16@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47044
https://www.cve.org/CVERecord?id=CVE-2021-47044
|
| kernel-headers |
CVE-2021-47046 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47046
https://git.kernel.org/stable/c/080bd41d6478a64edf96704fddcda52b1fd5fed7
https://git.kernel.org/stable/c/403c4528e5887af3deb9838cb77a557631d1e138
https://git.kernel.org/stable/c/6a58310d5d1e5b02d0fc9b393ba540c9367bced5
https://git.kernel.org/stable/c/8e6fafd5a22e7a2eb216f5510db7aab54cc545c1
https://lore.kernel.org/linux-cve-announce/2024022839-CVE-2021-47046-3ffe@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47046
https://www.cve.org/CVERecord?id=CVE-2021-47046
|
| kernel-headers |
CVE-2021-47047 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47047
https://git.kernel.org/stable/c/126bdb606fd2802454e6048caef1be3e25dd121e
https://git.kernel.org/stable/c/5980a3b9c933408bc22b0e349b78c3ebd7cbf880
https://git.kernel.org/stable/c/bad5a23cf2b477fa78b85fd392736dae09a1e818
https://git.kernel.org/stable/c/c26c026eb496261dbc0adbf606cc81989cd2038c
https://lore.kernel.org/linux-cve-announce/2024022839-CVE-2021-47047-4c75@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47047
https://www.cve.org/CVERecord?id=CVE-2021-47047
|
| kernel-headers |
CVE-2021-47060 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47060
https://git.kernel.org/stable/c/168e82f640ed1891a700bdb43e37da354b2ab63c
https://git.kernel.org/stable/c/2a20592baff59c5351c5200ec667e1a2aa22af85
https://git.kernel.org/stable/c/50cbad42bfea8c052b7ca590bd4126cdc898713c
https://git.kernel.org/stable/c/5d3c4c79384af06e3c8e25b7770b6247496b4417
https://git.kernel.org/stable/c/7d1bc32d6477ff96a32695ea4be8144e4513ab2d
https://lore.kernel.org/linux-cve-announce/2024022952-CVE-2021-47060-d2ce@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47060
https://www.cve.org/CVERecord?id=CVE-2021-47060
|
| kernel-headers |
CVE-2021-47063 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47063
https://git.kernel.org/stable/c/18149b420c9bd93c443e8d1f48a063d71d9f6aa1
https://git.kernel.org/stable/c/4d906839d321c2efbf3fed4bc31ffd9ff55b75c0
https://git.kernel.org/stable/c/98d7d76a74e48ec3ddf2e23950adff7edcab9327
https://git.kernel.org/stable/c/ce450934a00cf896e648fde08d0bd1426653d7a2
https://lore.kernel.org/linux-cve-announce/2024022953-CVE-2021-47063-2f50@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47063
https://www.cve.org/CVERecord?id=CVE-2021-47063
|
| kernel-headers |
CVE-2021-47068 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47068
https://git.kernel.org/stable/c/18175fe17ae043a0b81e5d511f8817825784c299
https://git.kernel.org/stable/c/18ae4a192a4496e48a5490b52812645d2413307c
https://git.kernel.org/stable/c/26157c82ba756767b2bd66d28a71b1bc454447f6
https://git.kernel.org/stable/c/374cdde4dcc9c909a60713abdbbf96d5e3e09f91
https://git.kernel.org/stable/c/48fba458fe54cc2a980a05c13e6c19b8b2cfb610
https://git.kernel.org/stable/c/6b7021ed36dabf29e56842e3408781cd3b82ef6e
https://git.kernel.org/stable/c/c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6
https://git.kernel.org/stable/c/ccddad6dd28530e716448e594c9ca7c76ccd0570
https://git.kernel.org/stable/c/e32352070bcac22be6ed8ab635debc280bb65b8c
https://lore.kernel.org/linux-cve-announce/2024022955-CVE-2021-47068-a416@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47068
https://www.cve.org/CVERecord?id=CVE-2021-47068
|
| kernel-headers |
CVE-2021-47069 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47069
https://git.kernel.org/stable/c/4528c0c323085e645b8765913b4a7fd42cf49b65
https://git.kernel.org/stable/c/807fa14536b26803b858da878b643be72952a097
https://git.kernel.org/stable/c/a11ddb37bf367e6b5239b95ca759e5389bb46048
https://lore.kernel.org/linux-cve-announce/2024030141-CVE-2021-47069-5797@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47069
https://www.cve.org/CVERecord?id=CVE-2021-47069
|
| kernel-headers |
CVE-2021-47070 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47070
https://git.kernel.org/stable/c/0b0226be3a52dadd965644bc52a807961c2c26df
https://git.kernel.org/stable/c/5f59240cf25b2f7a0fdffc2701482a70310fec07
https://lore.kernel.org/linux-cve-announce/2024030141-CVE-2021-47070-0525@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47070
https://www.cve.org/CVERecord?id=CVE-2021-47070
|
| kernel-headers |
CVE-2021-47071 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47071
https://git.kernel.org/stable/c/3ee098f96b8b6c1a98f7f97915f8873164e6af9d
https://git.kernel.org/stable/c/53486c467e356e06aa37047c984fccd64d78c827
https://git.kernel.org/stable/c/cdd91637d4ef33e2be19a8e16e72e7d00c996d76
https://git.kernel.org/stable/c/d84b5e912212b05f6b5bde9f682046accfbe0354
https://lore.kernel.org/linux-cve-announce/2024030141-CVE-2021-47071-cd46@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47071
https://www.cve.org/CVERecord?id=CVE-2021-47071
|
| kernel-headers |
CVE-2021-47072 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47072
https://git.kernel.org/stable/c/54a40fc3a1da21b52dbf19f72fdc27a2ec740760
https://git.kernel.org/stable/c/6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6
https://lore.kernel.org/linux-cve-announce/2024030141-CVE-2021-47072-52d4@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47072
https://www.cve.org/CVERecord?id=CVE-2021-47072
|
| kernel-headers |
CVE-2021-47074 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47074
https://git.kernel.org/stable/c/03504e3b54cc8118cc26c064e60a0b00c2308708
https://git.kernel.org/stable/c/551ba08d4b7eb26f75758cdb9f15105b276517ad
https://git.kernel.org/stable/c/9c980795ccd77e8abec33dd6fe28dfe1c4083e65
https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47074-46a7@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47074
https://www.cve.org/CVERecord?id=CVE-2021-47074
|
| kernel-headers |
CVE-2021-47075 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47075
https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb
https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a
https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f
https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47075-8d12@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47075
https://www.cve.org/CVERecord?id=CVE-2021-47075
|
| kernel-headers |
CVE-2021-47076 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47076
https://git.kernel.org/stable/c/abe31d25facdb9109fe2cf69890748295291570c
https://git.kernel.org/stable/c/dc07628bd2bbc1da768e265192c28ebd301f509d
https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47076
https://www.cve.org/CVERecord?id=CVE-2021-47076
|
| kernel-headers |
CVE-2021-47077 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47077
https://git.kernel.org/stable/c/11014efcec378bb0050a6cf08eaf375e3693400a
https://git.kernel.org/stable/c/73578af92a0fae6609b955fcc9113e50e413c80f
https://git.kernel.org/stable/c/a6362a737572f66051deb7637f3f77ddf7a4402f
https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47077-994b@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47077
https://www.cve.org/CVERecord?id=CVE-2021-47077
|
| kernel-headers |
CVE-2021-47078 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47078
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47078-71f9@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47078
https://www.cve.org/CVERecord?id=CVE-2021-47078
|
| kernel-headers |
CVE-2021-47079 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47079
https://git.kernel.org/stable/c/beab753fe3b4e087411a850a64c6cd748544d8a1
https://git.kernel.org/stable/c/ff67dbd554b2aaa22be933eced32610ff90209dd
https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47079-3934@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47079
https://www.cve.org/CVERecord?id=CVE-2021-47079
|
| kernel-headers |
CVE-2021-47080 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47080
https://git.kernel.org/stable/c/54d87913f147a983589923c7f651f97de9af5be1
https://git.kernel.org/stable/c/66ab7fcdac34b890017f04f391507ef5b2b89a13
https://git.kernel.org/stable/c/e6871b4270c05f8b212e7d98aee82b357972c80a
https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47080
https://www.cve.org/CVERecord?id=CVE-2021-47080
|
| kernel-headers |
CVE-2021-47081 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47081
https://git.kernel.org/stable/c/115726c5d312b462c9d9931ea42becdfa838a076
https://git.kernel.org/stable/c/b49f5af30b0e4064fbd91e83823a4bfcb2c7a3e7
https://lore.kernel.org/linux-cve-announce/2024030143-CVE-2021-47081-e590@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47081
https://www.cve.org/CVERecord?id=CVE-2021-47081
|
| kernel-headers |
CVE-2021-47082 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47082
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://nvd.nist.gov/vuln/detail/CVE-2021-47082
https://www.cve.org/CVERecord?id=CVE-2021-47082
|
| kernel-headers |
CVE-2021-47083 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47083
https://git.kernel.org/stable/c/2d5446da5acecf9c67db1c9d55ae2c3e5de01f8d
https://git.kernel.org/stable/c/441d3873664d170982922c5d2fc01fa89d9439ed
https://git.kernel.org/stable/c/f373298e1bf0c6ea097c0bcc558dc43ad53e421f
https://git.kernel.org/stable/c/fb563baa3eb8e7a15f2cff3c2695e2cca0493e69
https://lore.kernel.org/linux-cve-announce/2024030454-CVE-2021-47083-eab5@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2021-47083
https://www.cve.org/CVERecord?id=CVE-2021-47083
|
| kernel-headers |
CVE-2021-47090 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47090
https://git.kernel.org/stable/c/1f207076740101fed87074a6bc924dbe806f08a5
https://git.kernel.org/stable/c/2a57d83c78f889bf3f54eede908d0643c40d5418
https://git.kernel.org/stable/c/c691e7575eff76e563b0199c23ec46bd454f43e3
https://lore.kernel.org/linux-cve-announce/2024030413-CVE-2021-47090-a429@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2021-47090
https://www.cve.org/CVERecord?id=CVE-2021-47090
|
| kernel-headers |
CVE-2021-47091 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47091
https://git.kernel.org/stable/c/87a270625a89fc841f1a7e21aae6176543d8385c
https://git.kernel.org/stable/c/ac61b9c6c0549aaeb98194cf429d93c41bfe5f79
https://git.kernel.org/stable/c/c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f
https://lore.kernel.org/linux-cve-announce/2024030414-CVE-2021-47091-edad@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2021-47091
https://www.cve.org/CVERecord?id=CVE-2021-47091
|
| kernel-headers |
CVE-2021-47096 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47096
https://git.kernel.org/stable/c/39a8fc4971a00d22536aeb7d446ee4a97810611b
https://git.kernel.org/stable/c/b398fcbe4de1e1100867fdb6f447c6fbc8fe7085
https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47096-40c7@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2021-47096
https://www.cve.org/CVERecord?id=CVE-2021-47096
|
| kernel-headers |
CVE-2021-47097 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47097
https://git.kernel.org/stable/c/1d72d9f960ccf1052a0630a68c3d358791dbdaaa
https://git.kernel.org/stable/c/676c572439e58b7ee6b7ca3f1e5595382921045c
https://git.kernel.org/stable/c/a7f95328c6f0afffdc4555f16e3bbab8bbf0d9be
https://git.kernel.org/stable/c/dfd5b60b5342b6b505a104e48f08ad9b9bdbbd7b
https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47097-e7f4@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2021-47097
https://www.cve.org/CVERecord?id=CVE-2021-47097
|
| kernel-headers |
CVE-2021-47098 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47098
https://git.kernel.org/stable/c/55840b9eae5367b5d5b29619dc2fb7e4596dba46
https://git.kernel.org/stable/c/d105f30bea9104c590a9e5b495cb8a49bdfe405f
https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47098-e11f@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2021-47098
https://www.cve.org/CVERecord?id=CVE-2021-47098
|
| kernel-headers |
CVE-2021-47099 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47099
https://git.kernel.org/stable/c/9695b7de5b4760ed22132aca919570c0190cb0ce
https://git.kernel.org/stable/c/d2269ae48598e05b59ec9ea9e6e44fd33941130d
https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47099-3127@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2021-47099
https://www.cve.org/CVERecord?id=CVE-2021-47099
|
| kernel-headers |
CVE-2021-47103 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47103
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://lore.kernel.org/linux-cve-announce/2024030416-CVE-2021-47103-4314@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2021-47103
https://www.cve.org/CVERecord?id=CVE-2021-47103
|
| kernel-headers |
CVE-2021-47104 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47104
https://git.kernel.org/stable/c/0aaec9c5f60754b56f84460ea439b8c5e91f4caa
https://git.kernel.org/stable/c/1ced0a3015a95c6a6db45e37250912c4c86697ab
https://git.kernel.org/stable/c/76b648063eb36c72dfc0a6896de8a0a7d2c7841c
https://git.kernel.org/stable/c/79dcbd8176152b860028b62f81a635d987365752
https://git.kernel.org/stable/c/7cf6466e00a77b0a914b7b2c28a1fc7947d55e59
https://git.kernel.org/stable/c/aefcc25f3a0cd28a87d11d41d30419a12cd26a34
https://git.kernel.org/stable/c/bee90911e0138c76ee67458ac0d58b38a3190f65
https://git.kernel.org/stable/c/d53456492b5d02033c73dfa0f3b94c86337791ba
https://lore.kernel.org/linux-cve-announce/2024030444-CVE-2021-47104-bedc@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2021-47104
https://www.cve.org/CVERecord?id=CVE-2021-47104
|
| kernel-headers |
CVE-2021-47105 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47105
https://git.kernel.org/stable/c/ad6d20da2cfbe14b7b1200d15f39e65988b0b9e8
https://git.kernel.org/stable/c/afe8a3ba85ec2a6b6849367e25c06a2f8e0ddd05
https://lore.kernel.org/linux-cve-announce/2024030444-CVE-2021-47105-fa23@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2021-47105
https://www.cve.org/CVERecord?id=CVE-2021-47105
|
| kernel-headers |
CVE-2021-47106 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47106
https://git.kernel.org/stable/c/0f7d9b31ce7abdbb29bf018131ac920c9f698518
https://git.kernel.org/stable/c/9d558e5f0d6fdd0a568f73dceb0b40c4f5012e5a
https://lore.kernel.org/linux-cve-announce/2024030445-CVE-2021-47106-fdff@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2021-47106
https://www.cve.org/CVERecord?id=CVE-2021-47106
|
| kernel-headers |
CVE-2021-47107 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47107
https://git.kernel.org/stable/c/53b1119a6e5028b125f431a0116ba73510d82a72
https://git.kernel.org/stable/c/eabc0aab98e5218ceecd82069b0d6fdfff5ee885
https://lore.kernel.org/linux-cve-announce/2024030445-CVE-2021-47107-7dda@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2021-47107
https://www.cve.org/CVERecord?id=CVE-2021-47107
|
| kernel-headers |
CVE-2022-0001 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2022/03/18/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2022-0001
https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://linux.oracle.com/cve/CVE-2022-0001.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0001
https://security.netapp.com/advisory/ntap-20220818-0004/
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://ubuntu.com/security/notices/USN-5319-1
https://ubuntu.com/security/notices/USN-5362-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.cve.org/CVERecord?id=CVE-2022-0001
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.vusec.net/projects/bhi-spectre-bhb/
|
| kernel-headers |
CVE-2022-0002 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2022/03/18/2
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2022-0002
https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-12-March-2022-Security-Advisories/post/1365250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://linux.oracle.com/cve/CVE-2022-0002.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0002
https://security.netapp.com/advisory/ntap-20220818-0004/
https://ubuntu.com/security/notices/USN-5317-1
https://ubuntu.com/security/notices/USN-5318-1
https://ubuntu.com/security/notices/USN-5319-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BHI
https://www.cve.org/CVERecord?id=CVE-2022-0002
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.vusec.net/projects/bhi-spectre-bhb/
|
| kernel-headers |
CVE-2022-0480 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-0480
https://bugzilla.redhat.com/show_bug.cgi?id=2049700
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480
https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f12156dff2862ac54235fc72703f18770769042
https://github.com/kata-containers/kata-containers/issues/3373
https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm%40linux-foundation.org/
https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-0480
https://ubuntu.com/security/CVE-2022-0480
https://www.cve.org/CVERecord?id=CVE-2022-0480
|
| kernel-headers |
CVE-2022-0494 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:6003
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0494.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1353.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2588.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json
https://access.redhat.com/security/cve/CVE-2022-0494
https://bugzilla.redhat.com/2039448
https://bugzilla.redhat.com/2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2039448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
https://errata.almalinux.org/9/ALSA-2022-6003.html
https://git.kernel.org/linus/cc8f7fe1f5eab010191aa4570f27641876fa1267 (5.17-rc5)
https://linux.oracle.com/cve/CVE-2022-0494.html
https://linux.oracle.com/errata/ELSA-2022-7110.html
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel%40gmail.com/
https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-0494
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5560-1
https://ubuntu.com/security/notices/USN-5560-2
https://ubuntu.com/security/notices/USN-5562-1
https://ubuntu.com/security/notices/USN-5582-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2022-0494
https://www.debian.org/security/2022/dsa-5161
https://www.debian.org/security/2022/dsa-5173
|
| kernel-headers |
CVE-2022-0617 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2022/04/13/2
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2022-0617
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://errata.rockylinux.org/RLSA-2022:7683
https://git.kernel.org/linus/7fc3b7c2981bbd1047916ade327beccb90994eee
https://git.kernel.org/linus/ea8569194b43f0f01f0a84c689388542c7254a1f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f
https://linux.oracle.com/cve/CVE-2022-0617.html
https://linux.oracle.com/errata/ELSA-2022-9348.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr%40quack3.lan/T/
https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/
https://nvd.nist.gov/vuln/detail/CVE-2022-0617
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5384-1
https://ubuntu.com/security/notices/USN-5385-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2022-0617
https://www.debian.org/security/2022/dsa-5095
https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers |
CVE-2022-0812 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-0812
https://bugzilla.redhat.com/show_bug.cgi?id=2058361
https://bugzilla.redhat.com/show_bug.cgi?id=2058955
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=912288442cb2f431bf3c8cb097a5de83bc6dbac1
https://nvd.nist.gov/vuln/detail/CVE-2022-0812
https://security.netapp.com/advisory/ntap-20230427-0011/
https://ubuntu.com/security/CVE-2022-0812
https://ubuntu.com/security/notices/USN-5669-1
https://ubuntu.com/security/notices/USN-5669-2
https://ubuntu.com/security/notices/USN-5678-1
https://ubuntu.com/security/notices/USN-5679-1
https://ubuntu.com/security/notices/USN-5684-1
https://ubuntu.com/security/notices/USN-5687-1
https://ubuntu.com/security/notices/USN-5695-1
https://www.cve.org/CVERecord?id=CVE-2022-0812
|
| kernel-headers |
CVE-2022-0850 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-0850
https://bugzilla.redhat.com/show_bug.cgi?id=2060606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe
https://linux.oracle.com/cve/CVE-2022-0850.html
https://linux.oracle.com/errata/ELSA-2022-9852.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0850
https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8
https://ubuntu.com/security/notices/USN-5650-1
https://www.cve.org/CVERecord?id=CVE-2022-0850
|
| kernel-headers |
CVE-2022-0854 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2022-0854
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://errata.rockylinux.org/RLSA-2022:7683
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13
https://linux.oracle.com/cve/CVE-2022-0854.html
https://linux.oracle.com/errata/ELSA-2022-8267.html
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0854
https://ubuntu.com/security/notices/USN-5381-1
https://www.cve.org/CVERecord?id=CVE-2022-0854
https://www.debian.org/security/2022/dsa-5161
https://www.debian.org/security/2022/dsa-5173
|
| kernel-headers |
CVE-2022-1011 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2022-1011
https://bugzilla.redhat.com/show_bug.cgi?id=2064855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://git.kernel.org/linus/0c4bcfdecb1ac0967619ee7ff44871d93c08c909 (5.17-rc8)
https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next
https://linux.oracle.com/cve/CVE-2022-1011.html
https://linux.oracle.com/errata/ELSA-2022-9761.html
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/
https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-1011
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5515-1
https://ubuntu.com/security/notices/USN-5541-1
https://www.cve.org/CVERecord?id=CVE-2022-1011
https://www.debian.org/security/2022/dsa-5173
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2022-1016 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2022-1016
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://errata.rockylinux.org/RLSA-2022:7683
https://linux.oracle.com/cve/CVE-2022-1016.html
https://linux.oracle.com/errata/ELSA-2022-9368.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1016
https://seclists.org/oss-sec/2022/q1/205
https://ubuntu.com/security/notices/USN-5381-1
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5390-1
https://ubuntu.com/security/notices/USN-5390-2
https://ubuntu.com/security/notices/USN-5415-1
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2022-1016
https://www.openwall.com/lists/oss-security/2022/03/28/5
|
| kernel-headers |
CVE-2022-1280 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2022-1280
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=2071022
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1280
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://linux.oracle.com/cve/CVE-2022-1280.html
https://linux.oracle.com/errata/ELSA-2022-9829.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1280
https://twitter.com/spendergrsec/status/1513866037791440896
https://www.cve.org/CVERecord?id=CVE-2022-1280
https://www.openwall.com/lists/oss-security/2022/04/12/3
https://www.openwall.com/lists/oss-security/2022/04/13/1
|
| kernel-headers |
CVE-2022-1353 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0494.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1353.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23816.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23825.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2588.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29900.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29901.json
https://access.redhat.com/security/cve/CVE-2022-1353
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=2066819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://git.kernel.org/linus/9a564bccb78a76740ea9d75a259942df8143d02c (5.17)
https://github.com/torvalds/linux/commit/9a564bccb78a76740ea9d75a259942df8143d02c
https://linux.oracle.com/cve/CVE-2022-1353.html
https://linux.oracle.com/errata/ELSA-2022-9480.html
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1353
https://security.netapp.com/advisory/ntap-20220629-0001/
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5469-1
https://ubuntu.com/security/notices/USN-5500-1
https://ubuntu.com/security/notices/USN-5505-1
https://ubuntu.com/security/notices/USN-5513-1
https://ubuntu.com/security/notices/USN-5515-1
https://ubuntu.com/security/notices/USN-5541-1
https://www.cve.org/CVERecord?id=CVE-2022-1353
https://www.debian.org/security/2022/dsa-5127
https://www.debian.org/security/2022/dsa-5173
|
| kernel-headers |
CVE-2022-1679 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2022-1679
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/ath.git/commit/?h=ath-next&id=0ac4827f78c7ffe8eef074bc010e7e34bc22f533
https://linux.oracle.com/cve/CVE-2022-1679.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
https://lore.kernel.org/lkml/87ilqc7jv9.fsf%40kernel.org/t/
https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/
https://lore.kernel.org/lkml/f158608e209a6f45c76ec856474a796df93d9dcf.1652553719.git.paskripkin@gmail.com/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-1679
https://security.netapp.com/advisory/ntap-20220629-0007/
https://ubuntu.com/security/notices/USN-5500-1
https://ubuntu.com/security/notices/USN-5505-1
https://ubuntu.com/security/notices/USN-5513-1
https://ubuntu.com/security/notices/USN-5517-1
https://ubuntu.com/security/notices/USN-5529-1
https://ubuntu.com/security/notices/USN-5544-1
https://ubuntu.com/security/notices/USN-5560-1
https://ubuntu.com/security/notices/USN-5560-2
https://ubuntu.com/security/notices/USN-5562-1
https://ubuntu.com/security/notices/USN-5564-1
https://ubuntu.com/security/notices/USN-5566-1
https://ubuntu.com/security/notices/USN-5582-1
https://www.cve.org/CVERecord?id=CVE-2022-1679
|
| kernel-headers |
CVE-2022-20141 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-20141
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20141
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/linus/23d2b94043ca8835bd1e67749020e839f396a1c2 (5.15-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/igmp.c?h=v5.19&id=23d2b94043ca8835bd1e67749020e839f396a1c2
https://linux.oracle.com/cve/CVE-2022-20141.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://nvd.nist.gov/vuln/detail/CVE-2022-20141
https://source.android.com/security/bulletin/2022-06-01
https://ubuntu.com/security/notices/USN-5540-1
https://www.cve.org/CVERecord?id=CVE-2022-20141
|
| kernel-headers |
CVE-2022-20154 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-20154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20154
https://git.kernel.org/linus/5ec7d18d1813a5bead0b495045606c93873aecbb (5.16-rc8)
https://github.com/torvalds/linux/commit/5ec7d18d1813a5bead0b495045606c93873aecbb
https://nvd.nist.gov/vuln/detail/CVE-2022-20154
https://source.android.com/security/bulletin/pixel/2022-06-01
https://www.cve.org/CVERecord?id=CVE-2022-20154
|
| kernel-headers |
CVE-2022-20166 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-20166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20166
https://git.kernel.org/linus/aa838896d87af561a33ecefea1caa4c15a68bc47 (5.10-rc1)
https://nvd.nist.gov/vuln/detail/CVE-2022-20166
https://source.android.com/security/bulletin/pixel/2022-06-01
https://www.cve.org/CVERecord?id=CVE-2022-20166
|
| kernel-headers |
CVE-2022-20368 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2022-20368
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://errata.rockylinux.org/RLSA-2022:7683
https://git.kernel.org/linus/c700525fcc06b05adfea78039de02628af79e07a (5.17)
https://linux.oracle.com/cve/CVE-2022-20368.html
https://linux.oracle.com/errata/ELSA-2022-8267.html
https://nvd.nist.gov/vuln/detail/CVE-2022-20368
https://source.android.com/security/bulletin/pixel/2022-08-01
https://ubuntu.com/security/notices/USN-5580-1
https://ubuntu.com/security/notices/USN-5650-1
https://www.cve.org/CVERecord?id=CVE-2022-20368
|
| kernel-headers |
CVE-2022-20566 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-20566
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20566
https://git.kernel.org/linus/d0be8347c623e0ac4202a1d4e0373882821f56b0
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d0be8347c623e0ac4202a1d4e0373882821f56b0
https://nvd.nist.gov/vuln/detail/CVE-2022-20566
https://source.android.com/security/bulletin/pixel/2022-12-01
https://ubuntu.com/security/notices/USN-5884-1
https://ubuntu.com/security/notices/USN-5913-1
https://ubuntu.com/security/notices/USN-5926-1
https://www.cve.org/CVERecord?id=CVE-2022-20566
|
| kernel-headers |
CVE-2022-20572 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-20572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20572
https://git.kernel.org/linus/4caae58406f8ceb741603eee460d79bacca9b1b5
https://nvd.nist.gov/vuln/detail/CVE-2022-20572
https://source.android.com/security/bulletin/pixel/2022-12-01
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2022-20572
|
| kernel-headers |
CVE-2022-21233 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-21233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21233
https://lists.debian.org/debian-lts-announce/2023/04/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21233
https://security.netapp.com/advisory/ntap-20220923-0002/
https://ubuntu.com/security/notices/USN-5612-1
https://www.cve.org/CVERecord?id=CVE-2022-21233
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/stale-data-read-from-xapic.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00657.html
|
| kernel-headers |
CVE-2022-21499 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2022-21499
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://errata.rockylinux.org/RLSA-2022:7683
https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eadb2f47a3ced5c64b23b90fd2a3463f63726066
https://linux.oracle.com/cve/CVE-2022-21499.html
https://linux.oracle.com/errata/ELSA-2022-9927.html
https://nvd.nist.gov/vuln/detail/CVE-2022-21499
https://ubuntu.com/security/notices/USN-5465-1
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5468-1
https://ubuntu.com/security/notices/USN-5469-1
https://ubuntu.com/security/notices/USN-5470-1
https://ubuntu.com/security/notices/USN-5471-1
https://ubuntu.com/security/notices/USN-5484-1
https://www.cve.org/CVERecord?id=CVE-2022-21499
https://www.debian.org/security/2022/dsa-5161
https://www.openwall.com/lists/oss-security/2022/05/24/10
https://www.openwall.com/lists/oss-security/2022/05/24/7
|
| kernel-headers |
CVE-2022-2153 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-2153
https://bugzilla.redhat.com/show_bug.cgi?id=2069736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153
https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?h=queue&id=00b5f37189d24ac3ed46cb7f11742094778c46c
https://github.com/torvalds/linux/commit/00b5f37189d24ac3ed46cb7f11742094778c46ce
https://github.com/torvalds/linux/commit/7ec37d1cbe17d8189d9562178d8b29167fe1c31a
https://github.com/torvalds/linux/commit/b1e34d325397a33d97d845e312d7cf2a8b646b44
https://linux.oracle.com/cve/CVE-2022-2153.html
https://linux.oracle.com/errata/ELSA-2022-9710.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2022-2153
https://ubuntu.com/security/notices/USN-5727-1
https://ubuntu.com/security/notices/USN-5727-2
https://ubuntu.com/security/notices/USN-5728-1
https://ubuntu.com/security/notices/USN-5728-2
https://ubuntu.com/security/notices/USN-5728-3
https://ubuntu.com/security/notices/USN-5774-1
https://www.cve.org/CVERecord?id=CVE-2022-2153
https://www.openwall.com/lists/oss-security/2022/06/22/1
|
| kernel-headers |
CVE-2022-2196 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-2196
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/linus/2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
https://kernel.dance/#2e7eab81425a
https://linux.oracle.com/cve/CVE-2022-2196.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2022-2196
https://ubuntu.com/security/notices/USN-5970-1
https://ubuntu.com/security/notices/USN-5976-1
https://ubuntu.com/security/notices/USN-5977-1
https://ubuntu.com/security/notices/USN-5978-1
https://ubuntu.com/security/notices/USN-5979-1
https://ubuntu.com/security/notices/USN-5980-1
https://ubuntu.com/security/notices/USN-5982-1
https://ubuntu.com/security/notices/USN-5985-1
https://ubuntu.com/security/notices/USN-5987-1
https://ubuntu.com/security/notices/USN-6004-1
https://ubuntu.com/security/notices/USN-6020-1
https://ubuntu.com/security/notices/USN-6151-1
https://www.cve.org/CVERecord?id=CVE-2022-2196
|
| kernel-headers |
CVE-2022-23222 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2022/01/14/1
http://www.openwall.com/lists/oss-security/2022/01/18/2
http://www.openwall.com/lists/oss-security/2022/06/01/1
http://www.openwall.com/lists/oss-security/2022/06/04/3
http://www.openwall.com/lists/oss-security/2022/06/07/3
https://access.redhat.com/security/cve/CVE-2022-23222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCR3LIRUEXR7CA63W5M2HT3K63MZGKBR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5VTIZZUPC73IEJNZX66BY2YCBRZAELB/
https://nvd.nist.gov/vuln/detail/CVE-2022-23222
https://security.netapp.com/advisory/ntap-20220217-0002/
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5337-1
https://ubuntu.com/security/notices/USN-5362-1
https://ubuntu.com/security/notices/USN-5368-1
https://www.cve.org/CVERecord?id=CVE-2022-23222
https://www.debian.org/security/2022/dsa-5050
https://www.openwall.com/lists/oss-security/2022/01/13/1
|
| kernel-headers |
CVE-2022-2503 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-2503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503
https://github.com/google/security-research/security/advisories/GHSA-6vq3-w69p-w63m
https://linux.oracle.com/cve/CVE-2022-2503.html
https://linux.oracle.com/errata/ELSA-2022-9852.html
https://nvd.nist.gov/vuln/detail/CVE-2022-2503
https://security.netapp.com/advisory/ntap-20230214-0005/
https://ubuntu.com/security/notices/USN-5594-1
https://ubuntu.com/security/notices/USN-5599-1
https://ubuntu.com/security/notices/USN-5602-1
https://ubuntu.com/security/notices/USN-5616-1
https://ubuntu.com/security/notices/USN-5622-1
https://ubuntu.com/security/notices/USN-5623-1
https://ubuntu.com/security/notices/USN-5630-1
https://ubuntu.com/security/notices/USN-5639-1
https://ubuntu.com/security/notices/USN-5647-1
https://ubuntu.com/security/notices/USN-5654-1
https://ubuntu.com/security/notices/USN-5660-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2022-2503
|
| kernel-headers |
CVE-2022-25265 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2951
https://access.redhat.com/security/cve/CVE-2022-25265
https://bugzilla.redhat.com/2055499
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2085300
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2108696
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2122960
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2127985
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2150999
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2168297
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2180936
https://errata.almalinux.org/8/ALSA-2023-2951.html
https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294
https://github.com/x0reaxeax/exec-prot-bypass
https://linux.oracle.com/cve/CVE-2022-25265.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://nvd.nist.gov/vuln/detail/CVE-2022-25265
https://security.netapp.com/advisory/ntap-20220318-0005/
https://www.cve.org/CVERecord?id=CVE-2022-25265
|
| kernel-headers |
CVE-2022-2663 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-2663
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663
https://dgl.cx/2022/08/nat-again-irc-cve-2022-2663
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://linux.oracle.com/cve/CVE-2022-2663.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl%40dgl.cx/T/
https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl@dgl.cx/T/
https://nvd.nist.gov/vuln/detail/CVE-2022-2663
https://ubuntu.com/security/notices/USN-5791-1
https://ubuntu.com/security/notices/USN-5791-2
https://ubuntu.com/security/notices/USN-5791-3
https://ubuntu.com/security/notices/USN-5792-1
https://ubuntu.com/security/notices/USN-5792-2
https://ubuntu.com/security/notices/USN-5793-1
https://ubuntu.com/security/notices/USN-5793-2
https://ubuntu.com/security/notices/USN-5793-3
https://ubuntu.com/security/notices/USN-5793-4
https://ubuntu.com/security/notices/USN-5815-1
https://ubuntu.com/security/notices/USN-5854-1
https://ubuntu.com/security/notices/USN-5861-1
https://ubuntu.com/security/notices/USN-5862-1
https://ubuntu.com/security/notices/USN-5865-1
https://ubuntu.com/security/notices/USN-5877-1
https://ubuntu.com/security/notices/USN-5883-1
https://ubuntu.com/security/notices/USN-5924-1
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6007-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://ubuntu.com/security/notices/USN-6247-1
https://www.cve.org/CVERecord?id=CVE-2022-2663
https://www.debian.org/security/2022/dsa-5257
https://www.openwall.com/lists/oss-security/2022/08/30/1
https://www.youtube.com/watch?v=WIq-YgQuYCA
|
| kernel-headers |
CVE-2022-27672 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-27672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27672
https://kernel.org/doc/html//next/admin-guide/hw-vuln/cross-thread-rsb.html
https://linux.oracle.com/cve/CVE-2022-27672.html
https://linux.oracle.com/errata/ELSA-2023-12256.html
https://nvd.nist.gov/vuln/detail/CVE-2022-27672
https://security.gentoo.org/glsa/202402-07
https://ubuntu.com/security/notices/USN-5978-1
https://ubuntu.com/security/notices/USN-6079-1
https://ubuntu.com/security/notices/USN-6080-1
https://ubuntu.com/security/notices/USN-6085-1
https://ubuntu.com/security/notices/USN-6090-1
https://ubuntu.com/security/notices/USN-6091-1
https://ubuntu.com/security/notices/USN-6096-1
https://ubuntu.com/security/notices/USN-6133-1
https://ubuntu.com/security/notices/USN-6134-1
https://ubuntu.com/security/notices/USN-6284-1
https://ubuntu.com/security/notices/USN-6301-1
https://ubuntu.com/security/notices/USN-6312-1
https://ubuntu.com/security/notices/USN-6314-1
https://ubuntu.com/security/notices/USN-6331-1
https://ubuntu.com/security/notices/USN-6337-1
https://ubuntu.com/security/notices/USN-6385-1
https://ubuntu.com/security/notices/USN-6396-1
https://ubuntu.com/security/notices/USN-6396-2
https://ubuntu.com/security/notices/USN-6396-3
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1045
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1045
https://www.cve.org/CVERecord?id=CVE-2022-27672
https://www.openwall.com/lists/oss-security/2023/02/14/4
https://xenbits.xen.org/xsa/advisory-426.html
|
| kernel-headers |
CVE-2022-28388 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-28388
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/linus/3d3925ff6433f98992685a9679613a2cc97f3ce2 (5.18-rc1)
https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2
https://linux.oracle.com/cve/CVE-2022-28388.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28388
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5416-1
https://ubuntu.com/security/notices/USN-5469-1
https://ubuntu.com/security/notices/USN-5493-1
https://ubuntu.com/security/notices/USN-5493-2
https://ubuntu.com/security/notices/USN-5505-1
https://ubuntu.com/security/notices/USN-5513-1
https://ubuntu.com/security/notices/USN-5539-1
https://ubuntu.com/security/notices/USN-5541-1
https://www.cve.org/CVERecord?id=CVE-2022-28388
https://www.debian.org/security/2022/dsa-5127
https://www.debian.org/security/2022/dsa-5173
|
| kernel-headers |
CVE-2022-28390 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2022-28390
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://errata.rockylinux.org/RLSA-2022:7683
https://git.kernel.org/linus/c70222752228a62135cee3409dccefd494a24646 (5.18-rc1)
https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646
https://linux.oracle.com/cve/CVE-2022-28390.html
https://linux.oracle.com/errata/ELSA-2022-9557.html
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/
https://nvd.nist.gov/vuln/detail/CVE-2022-28390
https://security.netapp.com/advisory/ntap-20220513-0001/
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5416-1
https://ubuntu.com/security/notices/USN-5466-1
https://ubuntu.com/security/notices/USN-5467-1
https://ubuntu.com/security/notices/USN-5468-1
https://ubuntu.com/security/notices/USN-5469-1
https://www.cve.org/CVERecord?id=CVE-2022-28390
https://www.debian.org/security/2022/dsa-5127
https://www.debian.org/security/2022/dsa-5173
|
| kernel-headers |
CVE-2022-2873 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:0979
https://access.redhat.com/security/cve/CVE-2022-2873
https://bugzilla.redhat.com/2119048
https://bugzilla.redhat.com/2150999
https://bugzilla.redhat.com/2152548
https://bugzilla.redhat.com/2152807
https://bugzilla.redhat.com/2161713
https://bugzilla.redhat.com/show_bug.cgi?id=2119048
https://bugzilla.redhat.com/show_bug.cgi?id=2138818
https://bugzilla.redhat.com/show_bug.cgi?id=2141752
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43945
https://errata.almalinux.org/9/ALSA-2023-0979.html
https://errata.rockylinux.org/RLSA-2023:0832
https://linux.oracle.com/cve/CVE-2022-2873.html
https://linux.oracle.com/errata/ELSA-2023-12207.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97%40gmail.com/T/
https://lore.kernel.org/lkml/20220729093451.551672-1-zheyuma97@gmail.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2022-2873
https://security.netapp.com/advisory/ntap-20230120-0001/
https://ubuntu.com/security/notices/USN-5594-1
https://ubuntu.com/security/notices/USN-5599-1
https://ubuntu.com/security/notices/USN-5602-1
https://ubuntu.com/security/notices/USN-5616-1
https://ubuntu.com/security/notices/USN-5623-1
https://www.cve.org/CVERecord?id=CVE-2022-2873
https://www.debian.org/security/2023/dsa-5324
|
| kernel-headers |
CVE-2022-28796 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-28796
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28796
https://github.com/torvalds/linux/commit/cc16eecae687912238ee6efbff71ad31e2bc414e
https://nvd.nist.gov/vuln/detail/CVE-2022-28796
https://security.netapp.com/advisory/ntap-20220506-0006/
https://www.cve.org/CVERecord?id=CVE-2022-28796
https:/git.kernel.org/linus/cc16eecae687912238ee6efbff71ad31e2bc414e (5.18-rc1)
|
| kernel-headers |
CVE-2022-28893 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2022/04/11/3
http://www.openwall.com/lists/oss-security/2022/04/11/4
http://www.openwall.com/lists/oss-security/2022/04/11/5
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2022-28893
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://errata.rockylinux.org/RLSA-2022:7683
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a
https://github.com/torvalds/linux/commit/f00432063db1a0db484e85193eccc6845435b80e
https://linux.oracle.com/cve/CVE-2022-28893.html
https://linux.oracle.com/errata/ELSA-2022-8267.html
https://nvd.nist.gov/vuln/detail/CVE-2022-28893
https://security.netapp.com/advisory/ntap-20220526-0002/
https://ubuntu.com/security/notices/USN-5544-1
https://ubuntu.com/security/notices/USN-5562-1
https://ubuntu.com/security/notices/USN-5564-1
https://ubuntu.com/security/notices/USN-5566-1
https://ubuntu.com/security/notices/USN-5582-1
https://www.cve.org/CVERecord?id=CVE-2022-28893
https://www.debian.org/security/2022/dsa-5161
https://www.openwall.com/lists/oss-security/2022/04/11/3
https://www.openwall.com/lists/oss-security/2022/04/11/5
|
| kernel-headers |
CVE-2022-29581 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html
http://www.openwall.com/lists/oss-security/2022/05/18/2
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2022-29581
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://errata.rockylinux.org/RLSA-2022:7683
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8
https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8
https://linux.oracle.com/cve/CVE-2022-29581.html
https://linux.oracle.com/errata/ELSA-2022-8267.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29581
https://security.netapp.com/advisory/ntap-20220629-0005/
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5442-2
https://ubuntu.com/security/notices/USN-5443-1
https://ubuntu.com/security/notices/USN-5443-2
https://ubuntu.com/security/notices/USN-5444-1
https://www.cve.org/CVERecord?id=CVE-2022-29581
https://www.debian.org/security/2022/dsa-5173
|
| kernel-headers |
CVE-2022-3028 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-3028
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://github.com/torvalds/linux/commit/ba953a9d89a00c078b85f4b190bc1dde66fe16b5
https://linux.oracle.com/cve/CVE-2022-3028.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3MYP7WX4PNE6RCITVXA43CECBZT4CL6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKVA75UHKVOHNOEPCLUHTFGWCOOUBDM3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEQYVCNYUWB4CJ2YRAYNF2GGFQ7SUYC4/
https://lore.kernel.org/all/YtoWqEkKzvimzWS5%40gondor.apana.org.au/T/
https://lore.kernel.org/all/YtoWqEkKzvimzWS5@gondor.apana.org.au/T/
https://nvd.nist.gov/vuln/detail/CVE-2022-3028
https://security.netapp.com/advisory/ntap-20230214-0004/
https://ubuntu.com/security/notices/USN-5650-1
https://ubuntu.com/security/notices/USN-5693-1
https://ubuntu.com/security/notices/USN-5727-1
https://ubuntu.com/security/notices/USN-5727-2
https://ubuntu.com/security/notices/USN-5728-1
https://ubuntu.com/security/notices/USN-5728-2
https://ubuntu.com/security/notices/USN-5728-3
https://ubuntu.com/security/notices/USN-5729-1
https://ubuntu.com/security/notices/USN-5729-2
https://ubuntu.com/security/notices/USN-5774-1
https://www.cve.org/CVERecord?id=CVE-2022-3028
|
| kernel-headers |
CVE-2022-30594 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
http://packetstormsecurity.com/files/170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html
https://access.redhat.com/errata/RHSA-2023:0334
https://access.redhat.com/security/cve/CVE-2022-30594
https://bugs.chromium.org/p/project-zero/issues/detail?id=2276
https://bugzilla.redhat.com/2067482
https://bugzilla.redhat.com/2085300
https://bugzilla.redhat.com/2103681
https://bugzilla.redhat.com/2123309
https://bugzilla.redhat.com/2141752
https://bugzilla.redhat.com/2147572
https://bugzilla.redhat.com/show_bug.cgi?id=2067482
https://bugzilla.redhat.com/show_bug.cgi?id=2085300
https://bugzilla.redhat.com/show_bug.cgi?id=2103681
https://bugzilla.redhat.com/show_bug.cgi?id=2123309
https://bugzilla.redhat.com/show_bug.cgi?id=2141752
https://bugzilla.redhat.com/show_bug.cgi?id=2147572
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2959
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43945
https://errata.almalinux.org/9/ALSA-2023-0334.html
https://errata.rockylinux.org/RLSA-2023:0334
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee1fee900537b5d9560e9f937402de5ddc8412f3
https://git.kernel.org/linus/ee1fee900537b5d9560e9f937402de5ddc8412f3 (5.18-rc1)
https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3
https://linux.oracle.com/cve/CVE-2022-30594.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2022-30594
https://security.netapp.com/advisory/ntap-20220707-0001/
https://ubuntu.com/security/notices/USN-5442-1
https://ubuntu.com/security/notices/USN-5442-2
https://ubuntu.com/security/notices/USN-5443-1
https://ubuntu.com/security/notices/USN-5443-2
https://ubuntu.com/security/notices/USN-5465-1
https://www.cve.org/CVERecord?id=CVE-2022-30594
https://www.debian.org/security/2022/dsa-5173
|
| kernel-headers |
CVE-2022-3169 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-3169
https://bugzilla.kernel.org/show_bug.cgi?id=214771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3169
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1e866afd4bcdd01a70a5eddb4371158d3035ce03
https://linux.oracle.com/cve/CVE-2022-3169.html
https://linux.oracle.com/errata/ELSA-2023-12375.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2022-3169
https://ubuntu.com/security/notices/USN-5911-1
https://ubuntu.com/security/notices/USN-5912-1
https://ubuntu.com/security/notices/USN-5917-1
https://ubuntu.com/security/notices/USN-5929-1
https://ubuntu.com/security/notices/USN-5934-1
https://ubuntu.com/security/notices/USN-5935-1
https://ubuntu.com/security/notices/USN-5938-1
https://ubuntu.com/security/notices/USN-5939-1
https://ubuntu.com/security/notices/USN-5940-1
https://ubuntu.com/security/notices/USN-5941-1
https://ubuntu.com/security/notices/USN-5950-1
https://ubuntu.com/security/notices/USN-5951-1
https://ubuntu.com/security/notices/USN-5962-1
https://ubuntu.com/security/notices/USN-6000-1
https://www.cve.org/CVERecord?id=CVE-2022-3169
|
| kernel-headers |
CVE-2022-33981 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-33981
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33981
https://exchange.xforce.ibmcloud.com/vulnerabilities/225362
https://git.kernel.org/linus/233087ca063686964a53c829d547c7571e3f67bf (5.18-rc5)
https://github.com/torvalds/linux/commit/233087ca063686964a53c829d547c7571e3f67bf
https://linux.oracle.com/cve/CVE-2022-33981.html
https://linux.oracle.com/errata/ELSA-2022-9667.html
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2022-33981
https://seclists.org/oss-sec/2022/q2/66
https://ubuntu.com/security/notices/USN-5514-1
https://ubuntu.com/security/notices/USN-5518-1
https://ubuntu.com/security/notices/USN-5539-1
https://ubuntu.com/security/notices/USN-5560-1
https://ubuntu.com/security/notices/USN-5560-2
https://ubuntu.com/security/notices/USN-5564-1
https://www.cve.org/CVERecord?id=CVE-2022-33981
https://www.debian.org/security/2022/dsa-5173
https://www.openwall.com/lists/oss-security/2022/04/28/1
|
| kernel-headers |
CVE-2022-3424 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-3424
https://bugzilla.redhat.com/show_bug.cgi?id=2132640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3424
https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc
https://linux.oracle.com/cve/CVE-2022-3424.html
https://linux.oracle.com/errata/ELSA-2023-12565.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/all/20221006152643.1694235-1-zyytlz.wz@163.com/
https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/
https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz@163.com/
https://lore.kernel.org/all/20221117144859.4710-1-zyytlz.wz@163.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-3424
https://security.netapp.com/advisory/ntap-20230406-0005/
https://ubuntu.com/security/notices/USN-5856-1
https://ubuntu.com/security/notices/USN-5917-1
https://ubuntu.com/security/notices/USN-5924-1
https://ubuntu.com/security/notices/USN-5927-1
https://ubuntu.com/security/notices/USN-5934-1
https://ubuntu.com/security/notices/USN-5939-1
https://ubuntu.com/security/notices/USN-5940-1
https://ubuntu.com/security/notices/USN-5951-1
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-5981-1
https://ubuntu.com/security/notices/USN-5982-1
https://ubuntu.com/security/notices/USN-5984-1
https://ubuntu.com/security/notices/USN-5987-1
https://ubuntu.com/security/notices/USN-5991-1
https://ubuntu.com/security/notices/USN-6000-1
https://ubuntu.com/security/notices/USN-6004-1
https://ubuntu.com/security/notices/USN-6009-1
https://ubuntu.com/security/notices/USN-6024-1
https://ubuntu.com/security/notices/USN-6030-1
https://www.cve.org/CVERecord?id=CVE-2022-3424
https://www.spinics.net/lists/kernel/msg4518970.html
|
| kernel-headers |
CVE-2022-3524 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-3524
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/linus/3c52c6bb831f6335c176a0fc7214e26f43adbd11
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c52c6bb831f6335c176a0fc7214e26f43adbd11
https://linux.oracle.com/cve/CVE-2022-3524.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2022-3524
https://ubuntu.com/security/notices/USN-5754-1
https://ubuntu.com/security/notices/USN-5754-2
https://ubuntu.com/security/notices/USN-5755-1
https://ubuntu.com/security/notices/USN-5755-2
https://ubuntu.com/security/notices/USN-5756-1
https://ubuntu.com/security/notices/USN-5756-2
https://ubuntu.com/security/notices/USN-5756-3
https://ubuntu.com/security/notices/USN-5757-1
https://ubuntu.com/security/notices/USN-5757-2
https://ubuntu.com/security/notices/USN-5758-1
https://ubuntu.com/security/notices/USN-5773-1
https://ubuntu.com/security/notices/USN-5774-1
https://ubuntu.com/security/notices/USN-5779-1
https://ubuntu.com/security/notices/USN-5780-1
https://ubuntu.com/security/notices/USN-5789-1
https://vuldb.com/?id.211021
https://www.cve.org/CVERecord?id=CVE-2022-3524
|
| kernel-headers |
CVE-2022-3543 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-3543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3543
https://git.kernel.org/linus/7a62ed61367b8fd01bae1e18e30602c25060d824 (6.1-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=7a62ed61367b8fd01bae1e18e30602c25060d824
https://nvd.nist.gov/vuln/detail/CVE-2022-3543
https://ubuntu.com/security/notices/USN-5793-1
https://ubuntu.com/security/notices/USN-5793-2
https://ubuntu.com/security/notices/USN-5793-3
https://ubuntu.com/security/notices/USN-5793-4
https://ubuntu.com/security/notices/USN-5851-1
https://ubuntu.com/security/notices/USN-5860-1
https://ubuntu.com/security/notices/USN-5876-1
https://ubuntu.com/security/notices/USN-5877-1
https://vuldb.com/?id.211043
https://www.cve.org/CVERecord?id=CVE-2022-3543
|
| kernel-headers |
CVE-2022-3545 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/security/cve/CVE-2022-3545
https://bugzilla.redhat.com/2087568
https://bugzilla.redhat.com/2144379
https://bugzilla.redhat.com/2161310
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2187813
https://bugzilla.redhat.com/2187931
https://bugzilla.redhat.com/2231800
https://bugzilla.redhat.com/2237757
https://bugzilla.redhat.com/2244723
https://bugzilla.redhat.com/2245514
https://bugzilla.redhat.com/2246944
https://bugzilla.redhat.com/2246945
https://bugzilla.redhat.com/2253611
https://bugzilla.redhat.com/2253614
https://bugzilla.redhat.com/2253908
https://bugzilla.redhat.com/2254052
https://bugzilla.redhat.com/2254053
https://bugzilla.redhat.com/2254054
https://bugzilla.redhat.com/2255139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545
https://errata.almalinux.org/8/ALSA-2024-0897.html
https://git.kernel.org/linus/02e1a114fdb71e59ee6770294166c30d437bf86a (6.0-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=02e1a114fdb71e59ee6770294166c30d437bf86a
https://linux.oracle.com/cve/CVE-2022-3545.html
https://linux.oracle.com/errata/ELSA-2024-12169.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2022-3545
https://security.netapp.com/advisory/ntap-20221223-0003/
https://ubuntu.com/security/notices/USN-5858-1
https://ubuntu.com/security/notices/USN-5859-1
https://ubuntu.com/security/notices/USN-5883-1
https://ubuntu.com/security/notices/USN-5911-1
https://ubuntu.com/security/notices/USN-5912-1
https://ubuntu.com/security/notices/USN-5917-1
https://ubuntu.com/security/notices/USN-5919-1
https://ubuntu.com/security/notices/USN-5920-1
https://ubuntu.com/security/notices/USN-5924-1
https://ubuntu.com/security/notices/USN-5925-1
https://ubuntu.com/security/notices/USN-5927-1
https://ubuntu.com/security/notices/USN-5929-1
https://ubuntu.com/security/notices/USN-5934-1
https://ubuntu.com/security/notices/USN-5935-1
https://ubuntu.com/security/notices/USN-5938-1
https://ubuntu.com/security/notices/USN-5939-1
https://ubuntu.com/security/notices/USN-5940-1
https://ubuntu.com/security/notices/USN-5941-1
https://ubuntu.com/security/notices/USN-5950-1
https://ubuntu.com/security/notices/USN-5951-1
https://ubuntu.com/security/notices/USN-5962-1
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-6000-1
https://ubuntu.com/security/notices/USN-6007-1
https://vuldb.com/?id.211045
https://www.cve.org/CVERecord?id=CVE-2022-3545
https://www.debian.org/security/2023/dsa-5324
|
| kernel-headers |
CVE-2022-3566 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-3566
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/linus/f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57 (6.1-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57
https://linux.oracle.com/cve/CVE-2022-3566.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://nvd.nist.gov/vuln/detail/CVE-2022-3566
https://ubuntu.com/security/notices/USN-5754-1
https://ubuntu.com/security/notices/USN-5754-2
https://ubuntu.com/security/notices/USN-5755-1
https://ubuntu.com/security/notices/USN-5755-2
https://ubuntu.com/security/notices/USN-5756-1
https://ubuntu.com/security/notices/USN-5756-2
https://ubuntu.com/security/notices/USN-5756-3
https://ubuntu.com/security/notices/USN-5757-1
https://ubuntu.com/security/notices/USN-5757-2
https://ubuntu.com/security/notices/USN-5758-1
https://ubuntu.com/security/notices/USN-5773-1
https://ubuntu.com/security/notices/USN-5774-1
https://ubuntu.com/security/notices/USN-5779-1
https://ubuntu.com/security/notices/USN-5789-1
https://vuldb.com/?id.211089
https://www.cve.org/CVERecord?id=CVE-2022-3566
|
| kernel-headers |
CVE-2022-3567 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-3567
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/linus/364f997b5cfe1db0d63a390fe7c801fa2b3115f6 (6.1-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=364f997b5cfe1db0d63a390fe7c801fa2b3115f6
https://linux.oracle.com/cve/CVE-2022-3567.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://nvd.nist.gov/vuln/detail/CVE-2022-3567
https://ubuntu.com/security/notices/USN-5754-1
https://ubuntu.com/security/notices/USN-5754-2
https://ubuntu.com/security/notices/USN-5755-1
https://ubuntu.com/security/notices/USN-5755-2
https://ubuntu.com/security/notices/USN-5756-1
https://ubuntu.com/security/notices/USN-5756-2
https://ubuntu.com/security/notices/USN-5756-3
https://ubuntu.com/security/notices/USN-5757-1
https://ubuntu.com/security/notices/USN-5757-2
https://ubuntu.com/security/notices/USN-5758-1
https://ubuntu.com/security/notices/USN-5773-1
https://ubuntu.com/security/notices/USN-5774-1
https://ubuntu.com/security/notices/USN-5779-1
https://ubuntu.com/security/notices/USN-5789-1
https://ubuntu.com/security/notices/USN-5914-1
https://vuldb.com/?id.211090
https://www.cve.org/CVERecord?id=CVE-2022-3567
|
| kernel-headers |
CVE-2022-3594 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2022-3594
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/93e2be344a7db169b7119de21ac1bf253b8c6907 (6.1-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93e2be344a7db169b7119de21ac1bf253b8c6907
https://linux.oracle.com/cve/CVE-2022-3594.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2022-3594
https://ubuntu.com/security/notices/USN-5754-1
https://ubuntu.com/security/notices/USN-5754-2
https://ubuntu.com/security/notices/USN-5755-1
https://ubuntu.com/security/notices/USN-5755-2
https://ubuntu.com/security/notices/USN-5756-1
https://ubuntu.com/security/notices/USN-5756-2
https://ubuntu.com/security/notices/USN-5756-3
https://ubuntu.com/security/notices/USN-5757-1
https://ubuntu.com/security/notices/USN-5757-2
https://ubuntu.com/security/notices/USN-5758-1
https://ubuntu.com/security/notices/USN-5773-1
https://ubuntu.com/security/notices/USN-5774-1
https://ubuntu.com/security/notices/USN-5779-1
https://ubuntu.com/security/notices/USN-5789-1
https://vuldb.com/?id.211363
https://www.cve.org/CVERecord?id=CVE-2022-3594
|
| kernel-headers |
CVE-2022-3619 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-3619
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3619
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=97097c85c088e11651146da32a4e1cdb9dfa6193
https://linux.oracle.com/cve/CVE-2022-3619.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://nvd.nist.gov/vuln/detail/CVE-2022-3619
https://ubuntu.com/security/notices/USN-5780-1
https://ubuntu.com/security/notices/USN-5850-1
https://ubuntu.com/security/notices/USN-5851-1
https://ubuntu.com/security/notices/USN-5860-1
https://ubuntu.com/security/notices/USN-5876-1
https://ubuntu.com/security/notices/USN-5877-1
https://ubuntu.com/security/notices/USN-5878-1
https://ubuntu.com/security/notices/USN-5879-1
https://vuldb.com/?id.211918
https://www.cve.org/CVERecord?id=CVE-2022-3619
|
| kernel-headers |
CVE-2022-3628 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-3628
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6788ba8aed4e28e90f72d68a9d794e34eac17295
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c?id=6788ba8aed4e28e90f72d68a9d794e34eac17295
https://linux.oracle.com/cve/CVE-2022-3628.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://nvd.nist.gov/vuln/detail/CVE-2022-3628
https://seclists.org/oss-sec/2022/q4/60
https://ubuntu.com/security/notices/USN-5780-1
https://ubuntu.com/security/notices/USN-5850-1
https://ubuntu.com/security/notices/USN-5851-1
https://ubuntu.com/security/notices/USN-5853-1
https://ubuntu.com/security/notices/USN-5860-1
https://ubuntu.com/security/notices/USN-5874-1
https://ubuntu.com/security/notices/USN-5875-1
https://ubuntu.com/security/notices/USN-5876-1
https://ubuntu.com/security/notices/USN-5877-1
https://ubuntu.com/security/notices/USN-5878-1
https://ubuntu.com/security/notices/USN-5879-1
https://ubuntu.com/security/notices/USN-5883-1
https://ubuntu.com/security/notices/USN-5909-1
https://ubuntu.com/security/notices/USN-5918-1
https://ubuntu.com/security/notices/USN-5919-1
https://ubuntu.com/security/notices/USN-5920-1
https://ubuntu.com/security/notices/USN-5924-1
https://ubuntu.com/security/notices/USN-5925-1
https://ubuntu.com/security/notices/USN-5927-1
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-5976-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6007-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2022-3628
https://www.openwall.com/lists/oss-security/2022/10/29/1
|
| kernel-headers |
CVE-2022-36280 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-36280
https://bugzilla.openanolis.cn/show_bug.cgi?id=2071
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2022-36280
https://ubuntu.com/security/notices/USN-5915-1
https://ubuntu.com/security/notices/USN-5917-1
https://ubuntu.com/security/notices/USN-5924-1
https://ubuntu.com/security/notices/USN-5927-1
https://ubuntu.com/security/notices/USN-5934-1
https://ubuntu.com/security/notices/USN-5939-1
https://ubuntu.com/security/notices/USN-5940-1
https://ubuntu.com/security/notices/USN-5951-1
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-5976-1
https://ubuntu.com/security/notices/USN-5981-1
https://ubuntu.com/security/notices/USN-5982-1
https://ubuntu.com/security/notices/USN-5984-1
https://ubuntu.com/security/notices/USN-5987-1
https://ubuntu.com/security/notices/USN-5991-1
https://ubuntu.com/security/notices/USN-6000-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6004-1
https://ubuntu.com/security/notices/USN-6009-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://ubuntu.com/security/notices/USN-6030-1
https://ubuntu.com/security/notices/USN-6032-1
https://ubuntu.com/security/notices/USN-6079-1
https://ubuntu.com/security/notices/USN-6091-1
https://ubuntu.com/security/notices/USN-6096-1
https://www.cve.org/CVERecord?id=CVE-2022-36280
https://www.debian.org/security/2023/dsa-5324
|
| kernel-headers |
CVE-2022-3640 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-3640
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=42cf46dea905a80f6de218e837ba4d4cc33d6979
https://linux.oracle.com/cve/CVE-2022-3640.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGOIRR72OAFE53XZRUDZDP7INGLIC3E3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OD7VWUT7YAU4CJ247IF44NGVOAODAJGC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG2UPX3MQ7RKRJEUMGEH2TLPKZJCBU5C/
https://nvd.nist.gov/vuln/detail/CVE-2022-3640
https://ubuntu.com/security/notices/USN-5850-1
https://ubuntu.com/security/notices/USN-5851-1
https://ubuntu.com/security/notices/USN-5853-1
https://ubuntu.com/security/notices/USN-5860-1
https://ubuntu.com/security/notices/USN-5874-1
https://ubuntu.com/security/notices/USN-5875-1
https://ubuntu.com/security/notices/USN-5876-1
https://ubuntu.com/security/notices/USN-5877-1
https://ubuntu.com/security/notices/USN-5878-1
https://ubuntu.com/security/notices/USN-5879-1
https://ubuntu.com/security/notices/USN-5883-1
https://ubuntu.com/security/notices/USN-5909-1
https://ubuntu.com/security/notices/USN-5918-1
https://ubuntu.com/security/notices/USN-5919-1
https://ubuntu.com/security/notices/USN-5920-1
https://ubuntu.com/security/notices/USN-5924-1
https://ubuntu.com/security/notices/USN-5925-1
https://ubuntu.com/security/notices/USN-5927-1
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-6007-1
https://vuldb.com/?id.211944
https://www.cve.org/CVERecord?id=CVE-2022-3640
|
| kernel-headers |
CVE-2022-36402 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-36402
https://bugzilla.openanolis.cn/show_bug.cgi?id=2072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36402
https://linux.oracle.com/cve/CVE-2022-36402.html
https://linux.oracle.com/errata/ELSA-2024-0461.html
https://nvd.nist.gov/vuln/detail/CVE-2022-36402
https://www.cve.org/CVERecord?id=CVE-2022-36402
|
| kernel-headers |
CVE-2022-36879 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-36879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=f85daf0e725358be78dfd208dea5fd665d8cb901
https://github.com/torvalds/linux/commit/f85daf0e725358be78dfd208dea5fd665d8cb901
https://linux.oracle.com/cve/CVE-2022-36879.html
https://linux.oracle.com/errata/ELSA-2022-9852.html
https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2022-36879
https://security.netapp.com/advisory/ntap-20220901-0007/
https://ubuntu.com/security/notices/USN-5667-1
https://ubuntu.com/security/notices/USN-5668-1
https://ubuntu.com/security/notices/USN-5677-1
https://ubuntu.com/security/notices/USN-5682-1
https://ubuntu.com/security/notices/USN-5683-1
https://ubuntu.com/security/notices/USN-5703-1
https://ubuntu.com/security/notices/USN-5706-1
https://ubuntu.com/security/notices/USN-5727-1
https://ubuntu.com/security/notices/USN-5727-2
https://ubuntu.com/security/notices/USN-5774-1
https://ubuntu.com/security/notices/USN-5913-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2022-36879
https://www.debian.org/security/2022/dsa-5207
|
| kernel-headers |
CVE-2022-38096 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-38096
https://bugzilla.openanolis.cn/show_bug.cgi?id=2073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096
https://nvd.nist.gov/vuln/detail/CVE-2022-38096
https://www.cve.org/CVERecord?id=CVE-2022-38096
|
| kernel-headers |
CVE-2022-38457 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2022-38457
https://bugzilla.openanolis.cn/show_bug.cgi?id=2074
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://linux.oracle.com/cve/CVE-2022-38457.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://nvd.nist.gov/vuln/detail/CVE-2022-38457
https://www.cve.org/CVERecord?id=CVE-2022-38457
|
| kernel-headers |
CVE-2022-39188 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-39188
https://bugs.chromium.org/p/project-zero/issues/detail?id=2329
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15
https://git.kernel.org/linus/b67fbebd4cf980aecbcc750e1462128bffe8ae15
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b67fbebd4cf980aecbcc750e1462128bffe8ae15
https://github.com/torvalds/linux/commit/b67fbebd4cf980aecbcc750e1462128bffe8ae15
https://linux.oracle.com/cve/CVE-2022-39188.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
https://lore.kernel.org/stable/20220831191348.3388208-1-jannh@google.com/T/#u
https://lore.kernel.org/stable/CAG48ez3SEqOPcPCYGHVZv4iqEApujD5VtM3Re-tCKLDEFdEdbg%40mail.gmail.com/
https://lore.kernel.org/stable/CAG48ez3SEqOPcPCYGHVZv4iqEApujD5VtM3Re-tCKLDEFdEdbg@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-39188
https://ubuntu.com/security/notices/USN-5790-1
https://ubuntu.com/security/notices/USN-5791-1
https://ubuntu.com/security/notices/USN-5791-2
https://ubuntu.com/security/notices/USN-5791-3
https://ubuntu.com/security/notices/USN-5792-1
https://ubuntu.com/security/notices/USN-5792-2
https://ubuntu.com/security/notices/USN-5815-1
https://ubuntu.com/security/notices/USN-5877-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2022-39188
https://www.debian.org/security/2022/dsa-5257
|
| kernel-headers |
CVE-2022-39189 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-39189
https://bugs.chromium.org/p/project-zero/issues/detail?id=2309
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736
https://git.kernel.org/linus/6cd88243c7e03845a450795e134b488fc2afb736 (5.19-rc2)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736
https://github.com/torvalds/linux/commit/6cd88243c7e03845a450795e134b488fc2afb736
https://linux.oracle.com/cve/CVE-2022-39189.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://nvd.nist.gov/vuln/detail/CVE-2022-39189
https://security.netapp.com/advisory/ntap-20230214-0007/
https://ubuntu.com/security/notices/USN-5667-1
https://ubuntu.com/security/notices/USN-5683-1
https://ubuntu.com/security/notices/USN-5703-1
https://www.cve.org/CVERecord?id=CVE-2022-39189
https://www.debian.org/security/2023/dsa-5480
|
| kernel-headers |
CVE-2022-39190 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2022-39190
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39190
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://git.kernel.org/linus/e02f0d3970404bfea385b6edb86f2d936db0ea2b (6.0-rc3)
https://github.com/torvalds/linux/commit/e02f0d3970404bfea385b6edb86f2d936db0ea2b
https://linux.oracle.com/cve/CVE-2022-39190.html
https://linux.oracle.com/errata/ELSA-2022-8267.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
https://lore.kernel.org/all/20220824220330.64283-12-pablo%40netfilter.org/
https://lore.kernel.org/all/20220824220330.64283-12-pablo@netfilter.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-39190
https://twitter.com/pr0Ln
https://ubuntu.com/security/notices/USN-5729-1
https://ubuntu.com/security/notices/USN-5729-2
https://www.cve.org/CVERecord?id=CVE-2022-39190
|
| kernel-headers |
CVE-2022-40133 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2022-40133
https://bugzilla.openanolis.cn/show_bug.cgi?id=2075
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://linux.oracle.com/cve/CVE-2022-40133.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://nvd.nist.gov/vuln/detail/CVE-2022-40133
https://www.cve.org/CVERecord?id=CVE-2022-40133
|
| kernel-headers |
CVE-2022-40768 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2022/09/19/1
https://access.redhat.com/security/cve/CVE-2022-40768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40768
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=6022f210461fef67e6e676fd8544ca02d1bcfa7a
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/scsi/stex.c
https://linux.oracle.com/cve/CVE-2022-40768.html
https://linux.oracle.com/errata/ELSA-2022-10073.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
https://lore.kernel.org/all/20220908145154.2284098-1-gregkh%40linuxfoundation.org/
https://lore.kernel.org/all/20220908145154.2284098-1-gregkh@linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-40768
https://ubuntu.com/security/notices/USN-5693-1
https://ubuntu.com/security/notices/USN-5727-1
https://ubuntu.com/security/notices/USN-5727-2
https://ubuntu.com/security/notices/USN-5728-1
https://ubuntu.com/security/notices/USN-5728-2
https://ubuntu.com/security/notices/USN-5728-3
https://ubuntu.com/security/notices/USN-5729-1
https://ubuntu.com/security/notices/USN-5729-2
https://ubuntu.com/security/notices/USN-5758-1
https://ubuntu.com/security/notices/USN-5774-1
https://www.cve.org/CVERecord?id=CVE-2022-40768
https://www.openwall.com/lists/oss-security/2022/09/09/1
|
| kernel-headers |
CVE-2022-4095 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-4095
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4095
https://git.kernel.org/linus/e230a4455ac3e9b112f0367d1b8e255e141afae0 (6.0-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c53b3dcb9942b8ed7f81ee3921c4085d87070c73
https://linux.oracle.com/cve/CVE-2022-4095.html
https://linux.oracle.com/errata/ELSA-2023-12323.html
https://nvd.nist.gov/vuln/detail/CVE-2022-4095
https://security.netapp.com/advisory/ntap-20230420-0005/
https://ubuntu.com/security/notices/USN-5790-1
https://ubuntu.com/security/notices/USN-5791-1
https://ubuntu.com/security/notices/USN-5791-2
https://ubuntu.com/security/notices/USN-5791-3
https://ubuntu.com/security/notices/USN-5792-1
https://ubuntu.com/security/notices/USN-5792-2
https://ubuntu.com/security/notices/USN-5793-1
https://ubuntu.com/security/notices/USN-5793-2
https://ubuntu.com/security/notices/USN-5793-3
https://ubuntu.com/security/notices/USN-5793-4
https://ubuntu.com/security/notices/USN-5815-1
https://ubuntu.com/security/notices/USN-5877-1
https://ubuntu.com/security/notices/USN-6045-1
https://ubuntu.com/security/notices/USN-6071-1
https://www.cve.org/CVERecord?id=CVE-2022-4095
|
| kernel-headers |
CVE-2022-41218 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2022/09/23/4
http://www.openwall.com/lists/oss-security/2022/09/24/1
http://www.openwall.com/lists/oss-security/2022/09/24/2
https://access.redhat.com/errata/RHSA-2023:2951
https://access.redhat.com/security/cve/CVE-2022-41218
https://bugzilla.redhat.com/2055499
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2085300
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2108696
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2122960
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2127985
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2150999
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2168297
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2180936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41218
https://errata.almalinux.org/8/ALSA-2023-2951.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/dvb-core/dmxdev.c
https://linux.oracle.com/cve/CVE-2022-41218.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/
https://lore.kernel.org/all/20220908132754.30532-1-tiwai@suse.de/
https://lore.kernel.org/all/87sfklgozd.wl-tiwai@suse.de/
https://nvd.nist.gov/vuln/detail/CVE-2022-41218
https://ubuntu.com/security/notices/USN-5915-1
https://ubuntu.com/security/notices/USN-5917-1
https://ubuntu.com/security/notices/USN-5924-1
https://ubuntu.com/security/notices/USN-5927-1
https://ubuntu.com/security/notices/USN-5934-1
https://ubuntu.com/security/notices/USN-5939-1
https://ubuntu.com/security/notices/USN-5940-1
https://ubuntu.com/security/notices/USN-5951-1
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-5981-1
https://ubuntu.com/security/notices/USN-5982-1
https://ubuntu.com/security/notices/USN-5984-1
https://ubuntu.com/security/notices/USN-5987-1
https://ubuntu.com/security/notices/USN-5991-1
https://ubuntu.com/security/notices/USN-6000-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6004-1
https://ubuntu.com/security/notices/USN-6009-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://ubuntu.com/security/notices/USN-6024-1
https://ubuntu.com/security/notices/USN-6030-1
https://www.cve.org/CVERecord?id=CVE-2022-41218
https://www.debian.org/security/2023/dsa-5324
https://www.openwall.com/lists/oss-security/2022/09/23/4
|
| kernel-headers |
CVE-2022-4129 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-4129
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://linux.oracle.com/cve/CVE-2022-4129.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/
https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t
https://lore.kernel.org/all/20221114191619.124659-1-jakub@cloudflare.com/t
https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t
https://lore.kernel.org/netdev/20221121085426.21315-1-jakub@cloudflare.com/t
https://nvd.nist.gov/vuln/detail/CVE-2022-4129
https://ubuntu.com/security/notices/USN-6025-1
https://ubuntu.com/security/notices/USN-6027-1
https://ubuntu.com/security/notices/USN-6040-1
https://ubuntu.com/security/notices/USN-6057-1
https://ubuntu.com/security/notices/USN-6079-1
https://ubuntu.com/security/notices/USN-6091-1
https://ubuntu.com/security/notices/USN-6093-1
https://ubuntu.com/security/notices/USN-6096-1
https://ubuntu.com/security/notices/USN-6134-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6256-1
https://www.cve.org/CVERecord?id=CVE-2022-4129
|
| kernel-headers |
CVE-2022-41858 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/security/cve/CVE-2022-41858
https://bugzilla.redhat.com/2087568
https://bugzilla.redhat.com/2144379
https://bugzilla.redhat.com/2161310
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2187813
https://bugzilla.redhat.com/2187931
https://bugzilla.redhat.com/2231800
https://bugzilla.redhat.com/2237757
https://bugzilla.redhat.com/2244723
https://bugzilla.redhat.com/2245514
https://bugzilla.redhat.com/2246944
https://bugzilla.redhat.com/2246945
https://bugzilla.redhat.com/2253611
https://bugzilla.redhat.com/2253614
https://bugzilla.redhat.com/2253908
https://bugzilla.redhat.com/2254052
https://bugzilla.redhat.com/2254053
https://bugzilla.redhat.com/2254054
https://bugzilla.redhat.com/2255139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41858
https://errata.almalinux.org/8/ALSA-2024-0897.html
https://git.kernel.org/linus/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798 (5.18-rc2)
https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798
https://linux.oracle.com/cve/CVE-2022-41858.html
https://linux.oracle.com/errata/ELSA-2024-12169.html
https://nvd.nist.gov/vuln/detail/CVE-2022-41858
https://security.netapp.com/advisory/ntap-20230223-0006/
https://ubuntu.com/security/notices/USN-5884-1
https://ubuntu.com/security/notices/USN-5926-1
https://www.cve.org/CVERecord?id=CVE-2022-41858
|
| kernel-headers |
CVE-2022-4269 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:1470
https://access.redhat.com/security/cve/CVE-2022-4269
https://bugzilla.redhat.com/2150272
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2163379
https://bugzilla.redhat.com/show_bug.cgi?id=2150272
https://bugzilla.redhat.com/show_bug.cgi?id=2156322
https://bugzilla.redhat.com/show_bug.cgi?id=2163379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266
https://errata.almalinux.org/9/ALSA-2023-1470.html
https://errata.rockylinux.org/RLSA-2023:1470
https://linux.oracle.com/cve/CVE-2022-4269.html
https://linux.oracle.com/errata/ELSA-2023-1566.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/netdev/33dc43f587ec1388ba456b4915c75f02a8aae226.1663945716.git.dcaratti%40redhat.com/
https://lore.kernel.org/netdev/33dc43f587ec1388ba456b4915c75f02a8aae226.1663945716.git.dcaratti@redhat.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-4269
https://security.netapp.com/advisory/ntap-20230929-0001/
https://ubuntu.com/security/notices/USN-6033-1
https://ubuntu.com/security/notices/USN-6171-1
https://ubuntu.com/security/notices/USN-6175-1
https://ubuntu.com/security/notices/USN-6186-1
https://ubuntu.com/security/notices/USN-6187-1
https://ubuntu.com/security/notices/USN-6284-1
https://ubuntu.com/security/notices/USN-6300-1
https://ubuntu.com/security/notices/USN-6301-1
https://ubuntu.com/security/notices/USN-6311-1
https://ubuntu.com/security/notices/USN-6312-1
https://ubuntu.com/security/notices/USN-6314-1
https://ubuntu.com/security/notices/USN-6331-1
https://ubuntu.com/security/notices/USN-6332-1
https://ubuntu.com/security/notices/USN-6337-1
https://ubuntu.com/security/notices/USN-6347-1
https://ubuntu.com/security/notices/USN-6385-1
https://www.cve.org/CVERecord?id=CVE-2022-4269
https://www.debian.org/security/2023/dsa-5480
|
| kernel-headers |
CVE-2022-42720 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/169951/Kernel-Live-Patch-Security-Notice-LSN-0090-1.html
http://www.openwall.com/lists/oss-security/2022/10/13/5
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-42720
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://bugzilla.suse.com/show_bug.cgi?id=1204059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=0b7808818cb9df6680f98996b8e9a439fa7bcc2f
https://linux.oracle.com/cve/CVE-2022-42720.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
https://nvd.nist.gov/vuln/detail/CVE-2022-42720
https://security.netapp.com/advisory/ntap-20230203-0008/
https://ubuntu.com/security/notices/USN-5691-1
https://ubuntu.com/security/notices/USN-5692-1
https://ubuntu.com/security/notices/USN-5693-1
https://ubuntu.com/security/notices/USN-5700-1
https://ubuntu.com/security/notices/USN-5708-1
https://ubuntu.com/security/notices/USN-5752-1
https://www.cve.org/CVERecord?id=CVE-2022-42720
https://www.debian.org/security/2022/dsa-5257
https://www.openwall.com/lists/oss-security/2022/10/13/2
|
| kernel-headers |
CVE-2022-42895 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2022-42895
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
https://github.com/google/security-research/security/advisories/GHSA-vccx-8h74-2357
https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e
https://kernel.dance/#b1a2cd50c0357f243b7435a732b4e62ba3157a2e
https://linux.oracle.com/cve/CVE-2022-42895.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://nvd.nist.gov/vuln/detail/CVE-2022-42895
https://ubuntu.com/security/notices/USN-5780-1
https://ubuntu.com/security/notices/USN-5850-1
https://ubuntu.com/security/notices/USN-5851-1
https://ubuntu.com/security/notices/USN-5853-1
https://ubuntu.com/security/notices/USN-5858-1
https://ubuntu.com/security/notices/USN-5859-1
https://ubuntu.com/security/notices/USN-5860-1
https://ubuntu.com/security/notices/USN-5874-1
https://ubuntu.com/security/notices/USN-5875-1
https://ubuntu.com/security/notices/USN-5876-1
https://ubuntu.com/security/notices/USN-5877-1
https://ubuntu.com/security/notices/USN-5878-1
https://ubuntu.com/security/notices/USN-5879-1
https://ubuntu.com/security/notices/USN-5883-1
https://ubuntu.com/security/notices/USN-5884-1
https://ubuntu.com/security/notices/USN-5909-1
https://ubuntu.com/security/notices/USN-5918-1
https://ubuntu.com/security/notices/USN-5919-1
https://ubuntu.com/security/notices/USN-5920-1
https://ubuntu.com/security/notices/USN-5924-1
https://ubuntu.com/security/notices/USN-5925-1
https://ubuntu.com/security/notices/USN-5926-1
https://ubuntu.com/security/notices/USN-5927-1
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-6007-1
https://www.cve.org/CVERecord?id=CVE-2022-42895
|
| kernel-headers |
CVE-2022-44032 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-44032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44032
https://lore.kernel.org/lkml/20220915020834.GA110086%40ubuntu/
https://lore.kernel.org/lkml/20220915020834.GA110086@ubuntu/
https://lore.kernel.org/lkml/20220919040701.GA302806%40ubuntu/
https://lore.kernel.org/lkml/20220919040701.GA302806@ubuntu/
https://nvd.nist.gov/vuln/detail/CVE-2022-44032
https://www.cve.org/CVERecord?id=CVE-2022-44032
|
| kernel-headers |
CVE-2022-44033 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-44033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44033
https://lore.kernel.org/lkml/20220915020834.GA110086%40ubuntu/
https://lore.kernel.org/lkml/20220915020834.GA110086@ubuntu/
https://lore.kernel.org/lkml/20220919040457.GA302681%40ubuntu/
https://lore.kernel.org/lkml/20220919040457.GA302681@ubuntu/
https://nvd.nist.gov/vuln/detail/CVE-2022-44033
https://www.cve.org/CVERecord?id=CVE-2022-44033
|
| kernel-headers |
CVE-2022-4543 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-4543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4543
https://nvd.nist.gov/vuln/detail/CVE-2022-4543
https://www.cve.org/CVERecord?id=CVE-2022-4543
https://www.openwall.com/lists/oss-security/2022/12/16/3
https://www.willsroot.io/2022/12/entrybleed.html
|
| kernel-headers |
CVE-2022-45884 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7549
https://access.redhat.com/security/cve/CVE-2022-45884
https://bugzilla.redhat.com/2148510
https://bugzilla.redhat.com/2148517
https://bugzilla.redhat.com/2151956
https://bugzilla.redhat.com/2154178
https://bugzilla.redhat.com/2224048
https://bugzilla.redhat.com/2240249
https://bugzilla.redhat.com/2241924
https://bugzilla.redhat.com/show_bug.cgi?id=2148510
https://bugzilla.redhat.com/show_bug.cgi?id=2148517
https://bugzilla.redhat.com/show_bug.cgi?id=2151956
https://bugzilla.redhat.com/show_bug.cgi?id=2154178
https://bugzilla.redhat.com/show_bug.cgi?id=2224048
https://bugzilla.redhat.com/show_bug.cgi?id=2240249
https://bugzilla.redhat.com/show_bug.cgi?id=2241924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
https://errata.almalinux.org/8/ALSA-2023-7549.html
https://errata.rockylinux.org/RLSA-2023:7549
https://linux.oracle.com/cve/CVE-2022-45884.html
https://linux.oracle.com/errata/ELSA-2023-7549.html
https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel@gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-4-imv4bel%40gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-4-imv4bel@gmail.com/
https://lore.kernel.org/linux-media/20221117045925.14297-4-imv4bel@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-45884
https://security.netapp.com/advisory/ntap-20230113-0006/
https://www.cve.org/CVERecord?id=CVE-2022-45884
|
| kernel-headers |
CVE-2022-45885 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-45885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45885
https://linux.oracle.com/cve/CVE-2022-45885.html
https://linux.oracle.com/errata/ELSA-2023-12207.html
https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel@gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-2-imv4bel%40gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-2-imv4bel@gmail.com/
https://lore.kernel.org/linux-media/20221117045925.14297-2-imv4bel@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-45885
https://security.netapp.com/advisory/ntap-20230113-0006/
https://www.cve.org/CVERecord?id=CVE-2022-45885
|
| kernel-headers |
CVE-2022-45886 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7549
https://access.redhat.com/security/cve/CVE-2022-45886
https://bugzilla.redhat.com/2148510
https://bugzilla.redhat.com/2148517
https://bugzilla.redhat.com/2151956
https://bugzilla.redhat.com/2154178
https://bugzilla.redhat.com/2224048
https://bugzilla.redhat.com/2240249
https://bugzilla.redhat.com/2241924
https://bugzilla.redhat.com/show_bug.cgi?id=2148510
https://bugzilla.redhat.com/show_bug.cgi?id=2148517
https://bugzilla.redhat.com/show_bug.cgi?id=2151956
https://bugzilla.redhat.com/show_bug.cgi?id=2154178
https://bugzilla.redhat.com/show_bug.cgi?id=2224048
https://bugzilla.redhat.com/show_bug.cgi?id=2240249
https://bugzilla.redhat.com/show_bug.cgi?id=2241924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
https://errata.almalinux.org/8/ALSA-2023-7549.html
https://errata.rockylinux.org/RLSA-2023:7549
https://linux.oracle.com/cve/CVE-2022-45886.html
https://linux.oracle.com/errata/ELSA-2023-7549.html
https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel@gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-3-imv4bel%40gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-3-imv4bel@gmail.com/
https://lore.kernel.org/linux-media/20221117045925.14297-3-imv4bel@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-45886
https://security.netapp.com/advisory/ntap-20230113-0006/
https://ubuntu.com/security/notices/USN-6412-1
https://ubuntu.com/security/notices/USN-6466-1
https://www.cve.org/CVERecord?id=CVE-2022-45886
|
| kernel-headers |
CVE-2022-45887 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2022-45887
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45887
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://linux.oracle.com/cve/CVE-2022-45887.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel@gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel%40gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel@gmail.com/
https://lore.kernel.org/linux-media/20221117045925.14297-5-imv4bel@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-45887
https://security.netapp.com/advisory/ntap-20230113-0006/
https://ubuntu.com/security/notices/USN-6412-1
https://ubuntu.com/security/notices/USN-6466-1
https://www.cve.org/CVERecord?id=CVE-2022-45887
|
| kernel-headers |
CVE-2022-45919 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7549
https://access.redhat.com/security/cve/CVE-2022-45919
https://bugzilla.redhat.com/2148510
https://bugzilla.redhat.com/2148517
https://bugzilla.redhat.com/2151956
https://bugzilla.redhat.com/2154178
https://bugzilla.redhat.com/2224048
https://bugzilla.redhat.com/2240249
https://bugzilla.redhat.com/2241924
https://bugzilla.redhat.com/show_bug.cgi?id=2148510
https://bugzilla.redhat.com/show_bug.cgi?id=2148517
https://bugzilla.redhat.com/show_bug.cgi?id=2151956
https://bugzilla.redhat.com/show_bug.cgi?id=2154178
https://bugzilla.redhat.com/show_bug.cgi?id=2224048
https://bugzilla.redhat.com/show_bug.cgi?id=2240249
https://bugzilla.redhat.com/show_bug.cgi?id=2241924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45884
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45886
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2163
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178
https://errata.almalinux.org/8/ALSA-2023-7549.html
https://errata.rockylinux.org/RLSA-2023:7549
https://linux.oracle.com/cve/CVE-2022-45919.html
https://linux.oracle.com/errata/ELSA-2023-7549.html
https://lore.kernel.org/linux-media/20221121063308.GA33821%40ubuntu/T/#u
https://lore.kernel.org/linux-media/20221121063308.GA33821@ubuntu/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-45919
https://security.netapp.com/advisory/ntap-20230113-0008/
https://ubuntu.com/security/notices/USN-6412-1
https://ubuntu.com/security/notices/USN-6466-1
https://www.cve.org/CVERecord?id=CVE-2022-45919
|
| kernel-headers |
CVE-2022-45934 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-45934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d
https://linux.oracle.com/cve/CVE-2022-45934.html
https://linux.oracle.com/errata/ELSA-2023-12207.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDAKCGDW6CQ6G3RZWYZJO454R3L5CTQB/
https://nvd.nist.gov/vuln/detail/CVE-2022-45934
https://security.netapp.com/advisory/ntap-20230113-0008/
https://ubuntu.com/security/notices/USN-5794-1
https://ubuntu.com/security/notices/USN-5802-1
https://ubuntu.com/security/notices/USN-5803-1
https://ubuntu.com/security/notices/USN-5804-1
https://ubuntu.com/security/notices/USN-5804-2
https://ubuntu.com/security/notices/USN-5808-1
https://ubuntu.com/security/notices/USN-5809-1
https://ubuntu.com/security/notices/USN-5813-1
https://ubuntu.com/security/notices/USN-5814-1
https://ubuntu.com/security/notices/USN-5829-1
https://ubuntu.com/security/notices/USN-5830-1
https://ubuntu.com/security/notices/USN-5831-1
https://ubuntu.com/security/notices/USN-5832-1
https://ubuntu.com/security/notices/USN-5858-1
https://ubuntu.com/security/notices/USN-5860-1
https://ubuntu.com/security/notices/USN-5861-1
https://ubuntu.com/security/notices/USN-5863-1
https://ubuntu.com/security/notices/USN-5875-1
https://ubuntu.com/security/notices/USN-5877-1
https://ubuntu.com/security/notices/USN-5879-1
https://ubuntu.com/security/notices/USN-5914-1
https://ubuntu.com/security/notices/USN-5918-1
https://www.cve.org/CVERecord?id=CVE-2022-45934
https://www.debian.org/security/2023/dsa-5324
|
| kernel-headers |
CVE-2022-47929 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2022-47929
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=96398560f26aa07e8f2969d73c8197e6a6d10407
https://linux.oracle.com/cve/CVE-2022-47929.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2022-47929
https://tldp.org/HOWTO/Traffic-Control-HOWTO/components.html
https://ubuntu.com/security/notices/USN-5915-1
https://ubuntu.com/security/notices/USN-5917-1
https://ubuntu.com/security/notices/USN-5924-1
https://ubuntu.com/security/notices/USN-5927-1
https://ubuntu.com/security/notices/USN-5934-1
https://ubuntu.com/security/notices/USN-5939-1
https://ubuntu.com/security/notices/USN-5940-1
https://ubuntu.com/security/notices/USN-5951-1
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-5981-1
https://ubuntu.com/security/notices/USN-5984-1
https://ubuntu.com/security/notices/USN-5991-1
https://ubuntu.com/security/notices/USN-6000-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6009-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://ubuntu.com/security/notices/USN-6024-1
https://ubuntu.com/security/notices/USN-6025-1
https://ubuntu.com/security/notices/USN-6030-1
https://ubuntu.com/security/notices/USN-6040-1
https://ubuntu.com/security/notices/USN-6057-1
https://ubuntu.com/security/notices/USN-6134-1
https://ubuntu.com/security/notices/USN-6247-1
https://ubuntu.com/security/notices/USN-6248-1
https://www.cve.org/CVERecord?id=CVE-2022-47929
https://www.debian.org/security/2023/dsa-5324
https://www.spinics.net/lists/netdev/msg555705.html
|
| kernel-headers |
CVE-2022-47938 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2022/12/23/10
https://access.redhat.com/security/cve/CVE-2022-47938
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47938
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=824d4f64c20093275f72fc8101394d75ff6a249e
https://github.com/torvalds/linux/commit/824d4f64c20093275f72fc8101394d75ff6a249e
https://nvd.nist.gov/vuln/detail/CVE-2022-47938
https://www.cve.org/CVERecord?id=CVE-2022-47938
https://www.openwall.com/lists/oss-security/2022/12/22/9
https://www.openwall.com/lists/oss-security/2022/12/23/10
https://www.zerodayinitiative.com/advisories/ZDI-22-1689/
|
| kernel-headers |
CVE-2022-48619 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-48619
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10
https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc
https://linux.oracle.com/cve/CVE-2022-48619.html
https://linux.oracle.com/errata/ELSA-2024-12193.html
https://nvd.nist.gov/vuln/detail/CVE-2022-48619
https://www.cve.org/CVERecord?id=CVE-2022-48619
|
| kernel-headers |
CVE-2022-48627 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-48627
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://lore.kernel.org/linux-cve-announce/2024030252-CVE-2022-48627-c7bf@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-48627
https://www.cve.org/CVERecord?id=CVE-2022-48627
|
| kernel-headers |
CVE-2023-0394 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2023-0394
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/linus/cb3e9864cdbe35ff6378966660edbcbac955fe17 (6.2-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb3e9864cdbe35ff6378966660edbcbac955fe17
https://linux.oracle.com/cve/CVE-2023-0394.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2023-0394
https://security.netapp.com/advisory/ntap-20230302-0005/
https://ubuntu.com/security/notices/USN-5917-1
https://ubuntu.com/security/notices/USN-5924-1
https://ubuntu.com/security/notices/USN-5927-1
https://ubuntu.com/security/notices/USN-5934-1
https://ubuntu.com/security/notices/USN-5939-1
https://ubuntu.com/security/notices/USN-5940-1
https://ubuntu.com/security/notices/USN-5951-1
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-5976-1
https://ubuntu.com/security/notices/USN-5978-1
https://ubuntu.com/security/notices/USN-5981-1
https://ubuntu.com/security/notices/USN-5984-1
https://ubuntu.com/security/notices/USN-5991-1
https://ubuntu.com/security/notices/USN-6000-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6009-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://ubuntu.com/security/notices/USN-6025-1
https://ubuntu.com/security/notices/USN-6030-1
https://ubuntu.com/security/notices/USN-6040-1
https://ubuntu.com/security/notices/USN-6057-1
https://ubuntu.com/security/notices/USN-6079-1
https://ubuntu.com/security/notices/USN-6091-1
https://ubuntu.com/security/notices/USN-6096-1
https://ubuntu.com/security/notices/USN-6134-1
https://www.cve.org/CVERecord?id=CVE-2023-0394
https://www.openwall.com/lists/oss-security/2023/01/18/2
|
| kernel-headers |
CVE-2023-0458 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:4378
https://access.redhat.com/security/cve/CVE-2023-0458
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2215768
https://bugzilla.redhat.com/2218672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458
https://errata.almalinux.org/9/ALSA-2023-4378.html
https://git.kernel.org/linus/739790605705ddcf18f21782b9c99ad7d53a8c11 (6.2-rc5)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7
https://github.com/google/security-research/security/advisories/GHSA-m7j5-797w-vmrh
https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11
https://linux.oracle.com/cve/CVE-2023-0458.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2023-0458
https://ubuntu.com/security/notices/USN-6079-1
https://ubuntu.com/security/notices/USN-6091-1
https://ubuntu.com/security/notices/USN-6093-1
https://ubuntu.com/security/notices/USN-6096-1
https://ubuntu.com/security/notices/USN-6134-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6254-1
https://ubuntu.com/security/notices/USN-6256-1
https://ubuntu.com/security/notices/USN-6341-1
https://ubuntu.com/security/notices/USN-6385-1
https://www.cve.org/CVERecord?id=CVE-2023-0458
|
| kernel-headers |
CVE-2023-0590 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2458
https://access.redhat.com/security/cve/CVE-2023-0590
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2089701
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2106830
https://bugzilla.redhat.com/2107924
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2133490
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134380
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2147364
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2177371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590
https://errata.almalinux.org/9/ALSA-2023-2458.html
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=ebda44da44f6f309d302522b049f43d6f829f7aa
https://linux.oracle.com/cve/CVE-2023-0590.html
https://linux.oracle.com/errata/ELSA-2024-12150.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/
https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-0590
https://ubuntu.com/security/notices/USN-5850-1
https://ubuntu.com/security/notices/USN-5851-1
https://ubuntu.com/security/notices/USN-5860-1
https://ubuntu.com/security/notices/USN-5876-1
https://ubuntu.com/security/notices/USN-5877-1
https://ubuntu.com/security/notices/USN-5878-1
https://ubuntu.com/security/notices/USN-5879-1
https://ubuntu.com/security/notices/USN-6284-1
https://ubuntu.com/security/notices/USN-6301-1
https://ubuntu.com/security/notices/USN-6312-1
https://ubuntu.com/security/notices/USN-6314-1
https://ubuntu.com/security/notices/USN-6331-1
https://ubuntu.com/security/notices/USN-6337-1
https://www.cve.org/CVERecord?id=CVE-2023-0590
|
| kernel-headers |
CVE-2023-0597 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2023/07/28/1
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-0597
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0597
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=97e3d26b5e5f371b3ee223d94dd123e6c442ba80
https://gruss.cc/files/prefetch.pdf
https://linux.oracle.com/cve/CVE-2023-0597.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lore.kernel.org/lkml/Yz%2FmfJ1gjgshF19t@hirez.programming.kicks-ass.net/
https://nvd.nist.gov/vuln/detail/CVE-2023-0597
https://ubuntu.com/security/notices/USN-6206-1
https://ubuntu.com/security/notices/USN-6235-1
https://ubuntu.com/security/notices/USN-6300-1
https://ubuntu.com/security/notices/USN-6311-1
https://ubuntu.com/security/notices/USN-6332-1
https://ubuntu.com/security/notices/USN-6347-1
https://ubuntu.com/security/notices/USN-6440-1
https://ubuntu.com/security/notices/USN-6440-2
https://ubuntu.com/security/notices/USN-6440-3
https://ubuntu.com/security/notices/USN-6462-1
https://ubuntu.com/security/notices/USN-6462-2
https://www.cve.org/CVERecord?id=CVE-2023-0597
|
| kernel-headers |
CVE-2023-1073 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2023/11/05/2
http://www.openwall.com/lists/oss-security/2023/11/05/3
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/security/cve/CVE-2023-1073
https://bugzilla.redhat.com/2087568
https://bugzilla.redhat.com/2144379
https://bugzilla.redhat.com/2161310
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2187813
https://bugzilla.redhat.com/2187931
https://bugzilla.redhat.com/2231800
https://bugzilla.redhat.com/2237757
https://bugzilla.redhat.com/2244723
https://bugzilla.redhat.com/2245514
https://bugzilla.redhat.com/2246944
https://bugzilla.redhat.com/2246945
https://bugzilla.redhat.com/2253611
https://bugzilla.redhat.com/2253614
https://bugzilla.redhat.com/2253908
https://bugzilla.redhat.com/2254052
https://bugzilla.redhat.com/2254053
https://bugzilla.redhat.com/2254054
https://bugzilla.redhat.com/2255139
https://bugzilla.redhat.com/show_bug.cgi?id=2173403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073
https://errata.almalinux.org/8/ALSA-2024-0897.html
https://git.kernel.org/linus/b12fece4c64857e5fab4290bf01b2e0317a88456
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=b12fece4c64857e5fab4290bf01b2e0317a88456
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456
https://linux.oracle.com/cve/CVE-2023-1073.html
https://linux.oracle.com/errata/ELSA-2024-12169.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2023-1073
https://ubuntu.com/security/notices/USN-5978-1
https://ubuntu.com/security/notices/USN-6025-1
https://ubuntu.com/security/notices/USN-6027-1
https://ubuntu.com/security/notices/USN-6029-1
https://ubuntu.com/security/notices/USN-6030-1
https://ubuntu.com/security/notices/USN-6040-1
https://ubuntu.com/security/notices/USN-6057-1
https://ubuntu.com/security/notices/USN-6079-1
https://ubuntu.com/security/notices/USN-6091-1
https://ubuntu.com/security/notices/USN-6093-1
https://ubuntu.com/security/notices/USN-6096-1
https://ubuntu.com/security/notices/USN-6134-1
https://ubuntu.com/security/notices/USN-6149-1
https://ubuntu.com/security/notices/USN-6174-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6235-1
https://ubuntu.com/security/notices/USN-6256-1
https://www.cve.org/CVERecord?id=CVE-2023-1073
https://www.openwall.com/lists/oss-security/2023/01/17/3
https://www.openwall.com/lists/osssecurity/2023/01/17/3
|
| kernel-headers |
CVE-2023-1074 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2023/11/05/4
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-1074
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://bugzilla.redhat.com/show_bug.cgi?id=2173430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/458e279f861d3f61796894cd158b780765a1569f
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f
https://linux.oracle.com/cve/CVE-2023-1074.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2023-1074
https://ubuntu.com/security/notices/USN-5978-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://ubuntu.com/security/notices/USN-6025-1
https://ubuntu.com/security/notices/USN-6027-1
https://ubuntu.com/security/notices/USN-6029-1
https://ubuntu.com/security/notices/USN-6030-1
https://ubuntu.com/security/notices/USN-6031-1
https://ubuntu.com/security/notices/USN-6032-1
https://ubuntu.com/security/notices/USN-6040-1
https://ubuntu.com/security/notices/USN-6057-1
https://ubuntu.com/security/notices/USN-6079-1
https://ubuntu.com/security/notices/USN-6091-1
https://ubuntu.com/security/notices/USN-6093-1
https://ubuntu.com/security/notices/USN-6096-1
https://ubuntu.com/security/notices/USN-6134-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6256-1
https://www.cve.org/CVERecord?id=CVE-2023-1074
https://www.openwall.com/lists/oss-security/2023/01/23/1
|
| kernel-headers |
CVE-2023-1077 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-1077
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1077
https://git.kernel.org/linus/7c4a5b89a0b5a57a64b601775b296abf77a9fe97
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97
https://linux.oracle.com/cve/CVE-2023-1077.html
https://linux.oracle.com/errata/ELSA-2024-12150.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2023-1077
https://seclists.org/oss-sec/2023/q1/126
https://security.netapp.com/advisory/ntap-20230511-0002/
https://ubuntu.com/security/notices/USN-6033-1
https://ubuntu.com/security/notices/USN-6171-1
https://ubuntu.com/security/notices/USN-6172-1
https://ubuntu.com/security/notices/USN-6185-1
https://ubuntu.com/security/notices/USN-6187-1
https://ubuntu.com/security/notices/USN-6207-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6223-1
https://ubuntu.com/security/notices/USN-6256-1
https://www.cve.org/CVERecord?id=CVE-2023-1077
|
| kernel-headers |
CVE-2023-1095 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-1095
https://bugzilla.redhat.com/show_bug.cgi?id=2173973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095
https://git.kernel.org/linus/580077855a40741cf511766129702d97ff02f4d9 (6.0-rc1)
https://github.com/torvalds/linux/commit/580077855a40741cf511766129702d97ff02f4d9
https://linux.oracle.com/cve/CVE-2023-1095.html
https://linux.oracle.com/errata/ELSA-2023-12232.html
https://nvd.nist.gov/vuln/detail/CVE-2023-1095
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://ubuntu.com/security/notices/USN-6031-1
https://www.cve.org/CVERecord?id=CVE-2023-1095
|
| kernel-headers |
CVE-2023-1118 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-1118
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1118
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17
https://linux.oracle.com/cve/CVE-2023-1118.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2023-1118
https://security.netapp.com/advisory/ntap-20230413-0003/
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://ubuntu.com/security/notices/USN-6031-1
https://ubuntu.com/security/notices/USN-6032-1
https://ubuntu.com/security/notices/USN-6033-1
https://ubuntu.com/security/notices/USN-6079-1
https://ubuntu.com/security/notices/USN-6080-1
https://ubuntu.com/security/notices/USN-6081-1
https://ubuntu.com/security/notices/USN-6084-1
https://ubuntu.com/security/notices/USN-6085-1
https://ubuntu.com/security/notices/USN-6090-1
https://ubuntu.com/security/notices/USN-6091-1
https://ubuntu.com/security/notices/USN-6092-1
https://ubuntu.com/security/notices/USN-6094-1
https://ubuntu.com/security/notices/USN-6095-1
https://ubuntu.com/security/notices/USN-6096-1
https://ubuntu.com/security/notices/USN-6109-1
https://ubuntu.com/security/notices/USN-6118-1
https://ubuntu.com/security/notices/USN-6132-1
https://ubuntu.com/security/notices/USN-6133-1
https://ubuntu.com/security/notices/USN-6134-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6256-1
https://www.cve.org/CVERecord?id=CVE-2023-1118
https://www.openwall.com/lists/oss-security/2023/03/02/1
|
| kernel-headers |
CVE-2023-1206 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-1206
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://bugzilla.redhat.com/show_bug.cgi?id=2175903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/d11b0df7ddf1831f3e170972f43186dad520bfcc
https://linux.oracle.com/cve/CVE-2023-1206.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2023-1206
https://security.netapp.com/advisory/ntap-20230929-0006/
https://ubuntu.com/security/notices/USN-6343-1
https://ubuntu.com/security/notices/USN-6385-1
https://ubuntu.com/security/notices/USN-6412-1
https://ubuntu.com/security/notices/USN-6416-1
https://ubuntu.com/security/notices/USN-6416-2
https://ubuntu.com/security/notices/USN-6416-3
https://ubuntu.com/security/notices/USN-6417-1
https://ubuntu.com/security/notices/USN-6439-1
https://ubuntu.com/security/notices/USN-6439-2
https://ubuntu.com/security/notices/USN-6440-1
https://ubuntu.com/security/notices/USN-6440-2
https://ubuntu.com/security/notices/USN-6440-3
https://ubuntu.com/security/notices/USN-6445-1
https://ubuntu.com/security/notices/USN-6445-2
https://ubuntu.com/security/notices/USN-6460-1
https://ubuntu.com/security/notices/USN-6466-1
https://www.cve.org/CVERecord?id=CVE-2023-1206
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
|
| kernel-headers |
CVE-2023-1380 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
https://access.redhat.com/security/cve/CVE-2023-1380
https://bugzilla.redhat.com/show_bug.cgi?id=2177883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380
https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless-next.git/commit/?h=for-next&id=0da40e018fd034d87c9460123fa7f897b69fdee7
https://linux.oracle.com/cve/CVE-2023-1380.html
https://linux.oracle.com/errata/ELSA-2023-12688.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u
https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang@yonsei.ac.kr/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-1380
https://security.netapp.com/advisory/ntap-20230511-0001/
https://ubuntu.com/security/notices/USN-6127-1
https://ubuntu.com/security/notices/USN-6130-1
https://ubuntu.com/security/notices/USN-6131-1
https://ubuntu.com/security/notices/USN-6132-1
https://ubuntu.com/security/notices/USN-6135-1
https://ubuntu.com/security/notices/USN-6149-1
https://ubuntu.com/security/notices/USN-6150-1
https://ubuntu.com/security/notices/USN-6162-1
https://ubuntu.com/security/notices/USN-6173-1
https://ubuntu.com/security/notices/USN-6175-1
https://ubuntu.com/security/notices/USN-6186-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6256-1
https://ubuntu.com/security/notices/USN-6385-1
https://ubuntu.com/security/notices/USN-6460-1
https://www.cve.org/CVERecord?id=CVE-2023-1380
https://www.debian.org/security/2023/dsa-5480
https://www.openwall.com/lists/oss-security/2023/03/13/1
https://www.openwall.com/lists/oss-security/2023/03/14/1
|
| kernel-headers |
CVE-2023-1611 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-1611
https://bugzilla.redhat.com/show_bug.cgi?id=2181342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1611
https://git.kernel.org/pub/scm/linux/kernel/git/kdave/linux.git/commit/?h=next-fixes&id=2f1a6be12ab6c8470d5776e68644726c94257c54
https://github.com/torvalds/linux/commit/2f1a6be12ab6c8470d5776e68644726c94257c54
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5QCM6XO4HSPLGR3DFYWFRIA3GCBIHZR4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWECAZ7V7EPSXMINO6Q6KWNKDY2CO6ZW/
https://lore.kernel.org/linux-btrfs/35b9a70650ea947387cf352914a8774b4f7e8a6f.1679481128.git.fdmanana%40suse.com/
https://lore.kernel.org/linux-btrfs/35b9a70650ea947387cf352914a8774b4f7e8a6f.1679481128.git.fdmanana@suse.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-1611
https://ubuntu.com/security/notices/USN-6175-1
https://ubuntu.com/security/notices/USN-6186-1
https://ubuntu.com/security/notices/USN-6252-1
https://ubuntu.com/security/notices/USN-6254-1
https://ubuntu.com/security/notices/USN-6284-1
https://ubuntu.com/security/notices/USN-6300-1
https://ubuntu.com/security/notices/USN-6301-1
https://ubuntu.com/security/notices/USN-6311-1
https://ubuntu.com/security/notices/USN-6312-1
https://ubuntu.com/security/notices/USN-6314-1
https://ubuntu.com/security/notices/USN-6331-1
https://ubuntu.com/security/notices/USN-6332-1
https://ubuntu.com/security/notices/USN-6337-1
https://ubuntu.com/security/notices/USN-6347-1
https://ubuntu.com/security/notices/USN-6385-1
https://www.cve.org/CVERecord?id=CVE-2023-1611
|
| kernel-headers |
CVE-2023-1637 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:5091
https://access.redhat.com/security/cve/CVE-2023-1637
https://bugzilla.redhat.com/2181891
https://bugzilla.redhat.com/2213260
https://bugzilla.redhat.com/2213455
https://bugzilla.redhat.com/2217845
https://bugzilla.redhat.com/2220892
https://bugzilla.redhat.com/2220893
https://bugzilla.redhat.com/2225097
https://bugzilla.redhat.com/2225198
https://bugzilla.redhat.com/2225239
https://bugzilla.redhat.com/2225275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1637
https://errata.almalinux.org/9/ALSA-2023-5091.html
https://git.kernel.org/linus/e2a1256b17b16f9b9adf1b6fea56819e7b68e463 (5.18-rc2)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463
https://linux.oracle.com/cve/CVE-2023-1637.html
https://linux.oracle.com/errata/ELSA-2023-5069.html
https://nvd.nist.gov/vuln/detail/CVE-2023-1637
https://sourceware.org/bugzilla/show_bug.cgi?id=27398
https://www.cve.org/CVERecord?id=CVE-2023-1637
|
| kernel-headers |
CVE-2023-1989 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-1989
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/1e9ac114c4428fdb7ff4635b45d4f46017e8916f (6.3-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088
https://linux.oracle.com/cve/CVE-2023-1989.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2023-1989
https://security.netapp.com/advisory/ntap-20230601-0004/
https://ubuntu.com/security/notices/USN-6033-1
https://ubuntu.com/security/notices/USN-6175-1
https://ubuntu.com/security/notices/USN-6186-1
https://www.cve.org/CVERecord?id=CVE-2023-1989
https://www.debian.org/security/2023/dsa-5492
|
| kernel-headers |
CVE-2023-1998 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:4378
https://access.redhat.com/security/cve/CVE-2023-1998
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2215768
https://bugzilla.redhat.com/2218672
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1998
https://errata.almalinux.org/9/ALSA-2023-4378.html
https://git.kernel.org/linus/6921ed9049bc7457f66c1596c5b78aec0dae4a9d (6.3-rc1)
https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx
https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d
https://linux.oracle.com/cve/CVE-2023-1998.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2023-1998
https://ubuntu.com/security/notices/USN-6033-1
https://ubuntu.com/security/notices/USN-6171-1
https://ubuntu.com/security/notices/USN-6172-1
https://ubuntu.com/security/notices/USN-6185-1
https://ubuntu.com/security/notices/USN-6187-1
https://ubuntu.com/security/notices/USN-6207-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6223-1
https://ubuntu.com/security/notices/USN-6256-1
https://www.cve.org/CVERecord?id=CVE-2023-1998
|
| kernel-headers |
CVE-2023-2002 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:3723
https://access.redhat.com/security/cve/CVE-2023-2002
https://bugzilla.redhat.com/2179000
https://bugzilla.redhat.com/2187308
https://bugzilla.redhat.com/2187439
https://bugzilla.redhat.com/2188396
https://bugzilla.redhat.com/2192589
https://bugzilla.redhat.com/2196105
https://bugzilla.redhat.com/show_bug.cgi?id=2187308
https://bugzilla.redhat.com/show_bug.cgi?id=2213260
https://bugzilla.redhat.com/show_bug.cgi?id=2215768
https://bugzilla.redhat.com/show_bug.cgi?id=2217845
https://bugzilla.redhat.com/show_bug.cgi?id=2218672
https://bugzilla.redhat.com/show_bug.cgi?id=2220892
https://bugzilla.redhat.com/show_bug.cgi?id=2225097
https://bugzilla.redhat.com/show_bug.cgi?id=2225275
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004
https://errata.almalinux.org/9/ALSA-2023-3723.html
https://errata.rockylinux.org/RLSA-2023:5244
https://github.com/lrh2000/CVE-2023-2002
https://linux.oracle.com/cve/CVE-2023-2002.html
https://linux.oracle.com/errata/ELSA-2023-5244.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/linux-bluetooth/20230416080251.7717-1-lrh2000@pku.edu.cn/ (hardening)
https://lore.kernel.org/linux-bluetooth/20230416081404.8227-1-lrh2000@pku.edu.cn/
https://nvd.nist.gov/vuln/detail/CVE-2023-2002
https://security.netapp.com/advisory/ntap-20240202-0004/
https://ubuntu.com/security/notices/USN-6173-1
https://ubuntu.com/security/notices/USN-6283-1
https://ubuntu.com/security/notices/USN-6300-1
https://ubuntu.com/security/notices/USN-6311-1
https://ubuntu.com/security/notices/USN-6332-1
https://ubuntu.com/security/notices/USN-6340-1
https://ubuntu.com/security/notices/USN-6340-2
https://ubuntu.com/security/notices/USN-6347-1
https://ubuntu.com/security/notices/USN-6349-1
https://ubuntu.com/security/notices/USN-6357-1
https://ubuntu.com/security/notices/USN-6385-1
https://ubuntu.com/security/notices/USN-6397-1
https://www.cve.org/CVERecord?id=CVE-2023-2002
https://www.debian.org/security/2023/dsa-5480
https://www.openwall.com/lists/oss-security/2023/04/16/3
|
| kernel-headers |
CVE-2023-20569 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2023/08/08/4
http://xenbits.xen.org/xsa/advisory-434.html
https://access.redhat.com/errata/RHSA-2023:6595
https://access.redhat.com/security/cve/CVE-2023-20569
https://access.redhat.com/solutions/7049120
https://bugzilla.redhat.com/2207625
https://bugzilla.redhat.com/2238960
https://bugzilla.redhat.com/2238961
https://bugzilla.redhat.com/2238962
https://bugzilla.redhat.com/2238963
https://bugzilla.redhat.com/2238964
https://comsec.ethz.ch/research/microarch/inception/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569
https://errata.almalinux.org/9/ALSA-2023-6595.html
https://linux.oracle.com/cve/CVE-2023-20569.html
https://linux.oracle.com/errata/ELSA-2023-7749.html
https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
https://lore.kernel.org/linux-firmware/20230718231959.3163407-1-john.allen@amd.com/T/#meaa8272d3d5799ffebc729eeaaabb3a14d32665f
https://nvd.nist.gov/vuln/detail/CVE-2023-20569
https://ubuntu.com/security/notices/USN-6319-1
https://ubuntu.com/security/notices/USN-6412-1
https://ubuntu.com/security/notices/USN-6415-1
https://ubuntu.com/security/notices/USN-6416-1
https://ubuntu.com/security/notices/USN-6416-2
https://ubuntu.com/security/notices/USN-6416-3
https://ubuntu.com/security/notices/USN-6445-1
https://ubuntu.com/security/notices/USN-6445-2
https://ubuntu.com/security/notices/USN-6466-1
https://www.amd.com/content/dam/amd/en/documents/corporate/cr/speculative-return-stack-overflow-whitepaper.pdf
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html
https://www.cve.org/CVERecord?id=CVE-2023-20569
https://www.debian.org/security/2023/dsa-5475
|
| kernel-headers |
CVE-2023-2124 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:3723
https://access.redhat.com/security/cve/CVE-2023-2124
https://bugzilla.redhat.com/2179000
https://bugzilla.redhat.com/2187308
https://bugzilla.redhat.com/2187439
https://bugzilla.redhat.com/2188396
https://bugzilla.redhat.com/2192589
https://bugzilla.redhat.com/2196105
https://bugzilla.redhat.com/show_bug.cgi?id=2147364
https://bugzilla.redhat.com/show_bug.cgi?id=2181847
https://bugzilla.redhat.com/show_bug.cgi?id=2187439
https://bugzilla.redhat.com/show_bug.cgi?id=2188396
https://bugzilla.redhat.com/show_bug.cgi?id=2188470
https://bugzilla.redhat.com/show_bug.cgi?id=2192589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1829
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2194
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2235
https://errata.almalinux.org/9/ALSA-2023-3723.html
https://errata.rockylinux.org/RLSA-2023:4517
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210
https://linux.oracle.com/cve/CVE-2023-2124.html
https://linux.oracle.com/errata/ELSA-2023-4517.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/linux-xfs/20230412214034.GL3223426@dread.disaster.area/T/#m1ebbcd1ad061d2d33bef6f0534a2b014744d152d
https://nvd.nist.gov/vuln/detail/CVE-2023-2124
https://security.netapp.com/advisory/ntap-20230622-0010/
https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e
https://ubuntu.com/security/notices/USN-6206-1
https://ubuntu.com/security/notices/USN-6224-1
https://ubuntu.com/security/notices/USN-6228-1
https://ubuntu.com/security/notices/USN-6231-1
https://ubuntu.com/security/notices/USN-6235-1
https://ubuntu.com/security/notices/USN-6252-1
https://ubuntu.com/security/notices/USN-6254-1
https://ubuntu.com/security/notices/USN-6284-1
https://ubuntu.com/security/notices/USN-6300-1
https://ubuntu.com/security/notices/USN-6301-1
https://ubuntu.com/security/notices/USN-6311-1
https://ubuntu.com/security/notices/USN-6312-1
https://ubuntu.com/security/notices/USN-6314-1
https://ubuntu.com/security/notices/USN-6331-1
https://ubuntu.com/security/notices/USN-6332-1
https://ubuntu.com/security/notices/USN-6337-1
https://ubuntu.com/security/notices/USN-6347-1
https://www.cve.org/CVERecord?id=CVE-2023-2124
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5480
https://www.openwall.com/lists/oss-security/2023/04/19/2
|
| kernel-headers |
CVE-2023-2162 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2024:0113
https://access.redhat.com/security/cve/CVE-2023-2162
https://bugzilla.redhat.com/2187773
https://bugzilla.redhat.com/2207625
https://bugzilla.redhat.com/2237760
https://bugzilla.redhat.com/2239843
https://bugzilla.redhat.com/2245663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2162
https://errata.almalinux.org/8/ALSA-2024-0113.html
https://git.kernel.org/linus/f484a794e4ee2a9ce61f52a78e810ac45f3fe3b3 (6.2-rc6)
https://linux.oracle.com/cve/CVE-2023-2162.html
https://linux.oracle.com/errata/ELSA-2024-12069.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2023-2162
https://ubuntu.com/security/notices/USN-6079-1
https://ubuntu.com/security/notices/USN-6080-1
https://ubuntu.com/security/notices/USN-6081-1
https://ubuntu.com/security/notices/USN-6084-1
https://ubuntu.com/security/notices/USN-6085-1
https://ubuntu.com/security/notices/USN-6090-1
https://ubuntu.com/security/notices/USN-6091-1
https://ubuntu.com/security/notices/USN-6092-1
https://ubuntu.com/security/notices/USN-6094-1
https://ubuntu.com/security/notices/USN-6095-1
https://ubuntu.com/security/notices/USN-6096-1
https://ubuntu.com/security/notices/USN-6109-1
https://ubuntu.com/security/notices/USN-6118-1
https://ubuntu.com/security/notices/USN-6132-1
https://ubuntu.com/security/notices/USN-6133-1
https://ubuntu.com/security/notices/USN-6134-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6254-1
https://ubuntu.com/security/notices/USN-6256-1
https://ubuntu.com/security/notices/USN-6385-1
https://www.cve.org/CVERecord?id=CVE-2023-2162
https://www.spinics.net/lists/linux-scsi/msg181542.html
|
| kernel-headers |
CVE-2023-23454 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:2951
https://access.redhat.com/security/cve/CVE-2023-23454
https://bugzilla.redhat.com/2055499
https://bugzilla.redhat.com/2061703
https://bugzilla.redhat.com/2078466
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2085300
https://bugzilla.redhat.com/2090723
https://bugzilla.redhat.com/2108691
https://bugzilla.redhat.com/2108696
https://bugzilla.redhat.com/2114937
https://bugzilla.redhat.com/2122228
https://bugzilla.redhat.com/2122960
https://bugzilla.redhat.com/2123056
https://bugzilla.redhat.com/2124788
https://bugzilla.redhat.com/2127985
https://bugzilla.redhat.com/2130141
https://bugzilla.redhat.com/2133483
https://bugzilla.redhat.com/2134377
https://bugzilla.redhat.com/2134451
https://bugzilla.redhat.com/2134506
https://bugzilla.redhat.com/2134517
https://bugzilla.redhat.com/2134528
https://bugzilla.redhat.com/2137979
https://bugzilla.redhat.com/2143893
https://bugzilla.redhat.com/2143943
https://bugzilla.redhat.com/2144720
https://bugzilla.redhat.com/2150947
https://bugzilla.redhat.com/2150960
https://bugzilla.redhat.com/2150979
https://bugzilla.redhat.com/2150999
https://bugzilla.redhat.com/2151270
https://bugzilla.redhat.com/2154171
https://bugzilla.redhat.com/2154235
https://bugzilla.redhat.com/2160023
https://bugzilla.redhat.com/2162120
https://bugzilla.redhat.com/2165721
https://bugzilla.redhat.com/2168246
https://bugzilla.redhat.com/2168297
https://bugzilla.redhat.com/2176192
https://bugzilla.redhat.com/2180936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23454
https://errata.almalinux.org/8/ALSA-2023-2951.html
https://git.kernel.org/linus/caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=caa4b35b4317d5147b3ab0fbdc9c075c7d2e9c12
https://linux.oracle.com/cve/CVE-2023-23454.html
https://linux.oracle.com/errata/ELSA-2023-2951.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2023-23454
https://ubuntu.com/security/notices/USN-5915-1
https://ubuntu.com/security/notices/USN-5917-1
https://ubuntu.com/security/notices/USN-5934-1
https://ubuntu.com/security/notices/USN-5939-1
https://ubuntu.com/security/notices/USN-5940-1
https://ubuntu.com/security/notices/USN-5951-1
https://ubuntu.com/security/notices/USN-5982-1
https://ubuntu.com/security/notices/USN-5987-1
https://ubuntu.com/security/notices/USN-6000-1
https://ubuntu.com/security/notices/USN-6004-1
https://ubuntu.com/security/notices/USN-6079-1
https://ubuntu.com/security/notices/USN-6091-1
https://ubuntu.com/security/notices/USN-6096-1
https://www.cve.org/CVERecord?id=CVE-2023-23454
https://www.debian.org/security/2023/dsa-5324
https://www.openwall.com/lists/oss-security/2023/01/10/1
https://www.openwall.com/lists/oss-security/2023/01/10/4
|
| kernel-headers |
CVE-2023-23455 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-23455
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23455
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/a2965c7be0522eaa18808684b7b82b248515511b
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2965c7be0522eaa18808684b7b82b248515511b
https://linux.oracle.com/cve/CVE-2023-23455.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2023-23455
https://ubuntu.com/security/notices/USN-5915-1
https://ubuntu.com/security/notices/USN-5917-1
https://ubuntu.com/security/notices/USN-5924-1
https://ubuntu.com/security/notices/USN-5927-1
https://ubuntu.com/security/notices/USN-5934-1
https://ubuntu.com/security/notices/USN-5939-1
https://ubuntu.com/security/notices/USN-5940-1
https://ubuntu.com/security/notices/USN-5951-1
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-5981-1
https://ubuntu.com/security/notices/USN-5982-1
https://ubuntu.com/security/notices/USN-5984-1
https://ubuntu.com/security/notices/USN-5987-1
https://ubuntu.com/security/notices/USN-5991-1
https://ubuntu.com/security/notices/USN-6000-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6004-1
https://ubuntu.com/security/notices/USN-6009-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://ubuntu.com/security/notices/USN-6030-1
https://ubuntu.com/security/notices/USN-6071-1
https://ubuntu.com/security/notices/USN-6072-1
https://ubuntu.com/security/notices/USN-6079-1
https://ubuntu.com/security/notices/USN-6091-1
https://ubuntu.com/security/notices/USN-6096-1
https://www.cve.org/CVERecord?id=CVE-2023-23455
https://www.debian.org/security/2023/dsa-5324
https://www.openwall.com/lists/oss-security/2023/01/10/1
https://www.openwall.com/lists/oss-security/2023/01/10/4
|
| kernel-headers |
CVE-2023-24023 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-24023
https://dl.acm.org/doi/10.1145/3576915.3623066
https://nvd.nist.gov/vuln/detail/CVE-2023-24023
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/bluffs-vulnerability/
https://www.cve.org/CVERecord?id=CVE-2023-24023
|
| kernel-headers |
CVE-2023-2513 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-2513
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://bugzilla.redhat.com/show_bug.cgi?id=2193097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2513
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/67d7d8ad99beccd9fe92d585b87f1760dc9018e3 (6.0-rc1)
https://github.com/torvalds/linux/commit/67d7d8ad99be
https://linux.oracle.com/cve/CVE-2023-2513.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-2513
https://ubuntu.com/security/notices/USN-6254-1
https://www.cve.org/CVERecord?id=CVE-2023-2513
|
| kernel-headers |
CVE-2023-25775 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html
https://access.redhat.com/security/cve/CVE-2023-25775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775
https://linux.oracle.com/cve/CVE-2023-25775.html
https://linux.oracle.com/errata/ELSA-2024-12159.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://lore.kernel.org/all/20230818144838.1758-1-shiraz.saleem@intel.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-25775
https://security.netapp.com/advisory/ntap-20230915-0013/
https://ubuntu.com/security/notices/USN-6415-1
https://ubuntu.com/security/notices/USN-6496-1
https://ubuntu.com/security/notices/USN-6496-2
https://ubuntu.com/security/notices/USN-6502-1
https://ubuntu.com/security/notices/USN-6502-2
https://ubuntu.com/security/notices/USN-6502-3
https://ubuntu.com/security/notices/USN-6502-4
https://ubuntu.com/security/notices/USN-6516-1
https://ubuntu.com/security/notices/USN-6520-1
https://www.cve.org/CVERecord?id=CVE-2023-25775
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html
|
| kernel-headers |
CVE-2023-28328 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-28328
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://bugzilla.redhat.com/show_bug.cgi?id=2177389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28328
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://linux.oracle.com/cve/CVE-2023-28328.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/linux-media/20221120065918.2160782-1-zhongbaisong@huawei.com/
https://lore.kernel.org/lkml/CAO4mrfcPHB5aQJO=mpqV+p8mPLNg-Fok0gw8gZ=zemAfMGTzMg@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-28328
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-5981-1
https://ubuntu.com/security/notices/USN-5982-1
https://ubuntu.com/security/notices/USN-5984-1
https://ubuntu.com/security/notices/USN-5987-1
https://ubuntu.com/security/notices/USN-5991-1
https://ubuntu.com/security/notices/USN-6000-1
https://ubuntu.com/security/notices/USN-6004-1
https://ubuntu.com/security/notices/USN-6009-1
https://ubuntu.com/security/notices/USN-6024-1
https://ubuntu.com/security/notices/USN-6030-1
https://ubuntu.com/security/notices/USN-6149-1
https://ubuntu.com/security/notices/USN-6385-1
https://www.cve.org/CVERecord?id=CVE-2023-28328
|
| kernel-headers |
CVE-2023-28410 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-28410
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28410
https://github.com/torvalds/linux/commit/3886a86e7e6cc6ce2ce93c440fecd8f42aed0ce7
https://nvd.nist.gov/vuln/detail/CVE-2023-28410
https://security.netapp.com/advisory/ntap-20230622-0004/
https://www.cve.org/CVERecord?id=CVE-2023-28410
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00886.html
|
| kernel-headers |
CVE-2023-28464 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-28464
https://lore.kernel.org/lkml/20230309074645.74309-1-wzhmmmmm%40gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-28464
https://security.netapp.com/advisory/ntap-20230517-0004/
https://www.cve.org/CVERecord?id=CVE-2023-28464
https://www.openwall.com/lists/oss-security/2023/03/28/2
https://www.openwall.com/lists/oss-security/2023/03/28/3
|
| kernel-headers |
CVE-2023-30456 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-30456
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/112e66017bff7f2837030f34c2bc19501e9212d5 (6.3-rc3)
https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5
https://linux.oracle.com/cve/CVE-2023-30456.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://nvd.nist.gov/vuln/detail/CVE-2023-30456
https://security.netapp.com/advisory/ntap-20230511-0007/
https://ubuntu.com/security/notices/USN-6033-1
https://ubuntu.com/security/notices/USN-6123-1
https://ubuntu.com/security/notices/USN-6124-1
https://ubuntu.com/security/notices/USN-6127-1
https://ubuntu.com/security/notices/USN-6130-1
https://ubuntu.com/security/notices/USN-6131-1
https://ubuntu.com/security/notices/USN-6132-1
https://ubuntu.com/security/notices/USN-6135-1
https://ubuntu.com/security/notices/USN-6149-1
https://ubuntu.com/security/notices/USN-6150-1
https://ubuntu.com/security/notices/USN-6162-1
https://ubuntu.com/security/notices/USN-6175-1
https://ubuntu.com/security/notices/USN-6186-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6256-1
https://www.cve.org/CVERecord?id=CVE-2023-30456
|
| kernel-headers |
CVE-2023-3106 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-3106
https://bugzilla.redhat.com/show_bug.cgi?id=2221501
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3106
https://github.com/torvalds/linux/commit/1ba5bf993c6a3142e18e68ea6452b347f9cb5635
https://linux.oracle.com/cve/CVE-2023-3106.html
https://linux.oracle.com/errata/ELSA-2023-12759.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3106
https://www.cve.org/CVERecord?id=CVE-2023-3106
https:/git.kernel.org/linus/1ba5bf993c6a3142e18e68ea6452b347f9cb5635 (4.8-rc7)
|
| kernel-headers |
CVE-2023-3108 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-3108
https://bugzilla.redhat.com/show_bug.cgi?id=2221472
https://github.com/torvalds/linux/commit/9399f0c51489ae8c16d6559b82a452fdc1895e91
https://nvd.nist.gov/vuln/detail/CVE-2023-3108
https://www.cve.org/CVERecord?id=CVE-2023-3108
|
| kernel-headers |
CVE-2023-31082 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-31082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31082
https://lore.kernel.org/all/CA+UBctCZok5FSQ=LPRA+A-jocW=L8FuMVZ_7MNqhh483P5yN8A%40mail.gmail.com/
https://lore.kernel.org/all/CA+UBctCZok5FSQ=LPRA+A-jocW=L8FuMVZ_7MNqhh483P5yN8A@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-31082
https://security.netapp.com/advisory/ntap-20230929-0003/
https://www.cve.org/CVERecord?id=CVE-2023-31082
|
| kernel-headers |
CVE-2023-31083 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-31083
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31083
https://git.kernel.org/bluetooth/bluetooth-next/c/ff1b86784849
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/bluetooth/hci_ldisc.c?h=v6.6-rc7&id=9c33663af9ad115f90c076a1828129a3fbadea98
https://lore.kernel.org/all/CA+UBctC3p49aTgzbVgkSZ2+TQcqq4fPDO7yZitFT5uBPDeCO2g%40mail.gmail.com/
https://lore.kernel.org/all/CA+UBctC3p49aTgzbVgkSZ2+TQcqq4fPDO7yZitFT5uBPDeCO2g@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-31083
https://security.netapp.com/advisory/ntap-20230929-0003/
https://ubuntu.com/security/notices/USN-6439-1
https://ubuntu.com/security/notices/USN-6439-2
https://ubuntu.com/security/notices/USN-6440-1
https://ubuntu.com/security/notices/USN-6440-2
https://ubuntu.com/security/notices/USN-6440-3
https://ubuntu.com/security/notices/USN-6462-1
https://ubuntu.com/security/notices/USN-6462-2
https://ubuntu.com/security/notices/USN-6464-1
https://ubuntu.com/security/notices/USN-6465-1
https://ubuntu.com/security/notices/USN-6465-2
https://ubuntu.com/security/notices/USN-6465-3
https://ubuntu.com/security/notices/USN-6466-1
https://ubuntu.com/security/notices/USN-6516-1
https://ubuntu.com/security/notices/USN-6520-1
https://www.cve.org/CVERecord?id=CVE-2023-31083
|
| kernel-headers |
CVE-2023-31084 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-31084
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31084
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://linux.oracle.com/cve/CVE-2023-31084.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/
https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/
https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-31084
https://security.netapp.com/advisory/ntap-20230929-0003/
https://ubuntu.com/security/notices/USN-6231-1
https://ubuntu.com/security/notices/USN-6309-1
https://ubuntu.com/security/notices/USN-6327-1
https://ubuntu.com/security/notices/USN-6338-1
https://ubuntu.com/security/notices/USN-6338-2
https://ubuntu.com/security/notices/USN-6339-1
https://ubuntu.com/security/notices/USN-6339-2
https://ubuntu.com/security/notices/USN-6339-3
https://ubuntu.com/security/notices/USN-6339-4
https://ubuntu.com/security/notices/USN-6340-1
https://ubuntu.com/security/notices/USN-6340-2
https://ubuntu.com/security/notices/USN-6342-1
https://ubuntu.com/security/notices/USN-6342-2
https://ubuntu.com/security/notices/USN-6344-1
https://ubuntu.com/security/notices/USN-6349-1
https://ubuntu.com/security/notices/USN-6350-1
https://ubuntu.com/security/notices/USN-6351-1
https://ubuntu.com/security/notices/USN-6357-1
https://ubuntu.com/security/notices/USN-6397-1
https://www.cve.org/CVERecord?id=CVE-2023-31084
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5480
|
| kernel-headers |
CVE-2023-31085 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-31085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31085
https://lore.kernel.org/all/20230831111100.26862-1-jack@suse.cz/T/#u
https://lore.kernel.org/all/687864524.118195.1681799447034.JavaMail.zimbra%40nod.at/
https://lore.kernel.org/all/687864524.118195.1681799447034.JavaMail.zimbra@nod.at/
https://nvd.nist.gov/vuln/detail/CVE-2023-31085
https://patchwork.ozlabs.org/project/linux-mtd/patch/20230423111041.684297-1-chengzhihao1@huawei.com/
https://security.netapp.com/advisory/ntap-20230929-0003/
https://ubuntu.com/security/notices/USN-6461-1
https://ubuntu.com/security/notices/USN-6494-1
https://ubuntu.com/security/notices/USN-6494-2
https://ubuntu.com/security/notices/USN-6495-1
https://ubuntu.com/security/notices/USN-6495-2
https://ubuntu.com/security/notices/USN-6496-1
https://ubuntu.com/security/notices/USN-6496-2
https://ubuntu.com/security/notices/USN-6502-1
https://ubuntu.com/security/notices/USN-6502-2
https://ubuntu.com/security/notices/USN-6502-3
https://ubuntu.com/security/notices/USN-6502-4
https://ubuntu.com/security/notices/USN-6503-1
https://ubuntu.com/security/notices/USN-6516-1
https://ubuntu.com/security/notices/USN-6520-1
https://ubuntu.com/security/notices/USN-6532-1
https://ubuntu.com/security/notices/USN-6537-1
https://ubuntu.com/security/notices/USN-6572-1
https://www.cve.org/CVERecord?id=CVE-2023-31085
|
| kernel-headers |
CVE-2023-3161 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-3161
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://bugzilla.redhat.com/show_bug.cgi?id=2213485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3161
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/2b09d5d364986f724f17001ccfe4126b9b43a0be (6.2-rc7)
https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be
https://linux.oracle.com/cve/CVE-2023-3161.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3161
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6254-1
https://ubuntu.com/security/notices/USN-6256-1
https://www.cve.org/CVERecord?id=CVE-2023-3161
|
| kernel-headers |
CVE-2023-3268 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-3268
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/43ec16f1450f4936025a9bdf1a273affdb9732c1 (6.4-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1
https://linux.oracle.com/cve/CVE-2023-3268.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/
https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc@wangsu.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2023-3268
https://security.netapp.com/advisory/ntap-20230824-0006/
https://ubuntu.com/security/notices/USN-6252-1
https://ubuntu.com/security/notices/USN-6254-1
https://ubuntu.com/security/notices/USN-6283-1
https://ubuntu.com/security/notices/USN-6300-1
https://ubuntu.com/security/notices/USN-6311-1
https://ubuntu.com/security/notices/USN-6332-1
https://ubuntu.com/security/notices/USN-6340-1
https://ubuntu.com/security/notices/USN-6340-2
https://ubuntu.com/security/notices/USN-6347-1
https://ubuntu.com/security/notices/USN-6349-1
https://ubuntu.com/security/notices/USN-6357-1
https://ubuntu.com/security/notices/USN-6397-1
https://www.cve.org/CVERecord?id=CVE-2023-3268
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5480
|
| kernel-headers |
CVE-2023-3567 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://access.redhat.com/errata/RHSA-2024:0412
https://access.redhat.com/errata/RHSA-2024:0431
https://access.redhat.com/errata/RHSA-2024:0432
https://access.redhat.com/errata/RHSA-2024:0439
https://access.redhat.com/errata/RHSA-2024:0448
https://access.redhat.com/errata/RHSA-2024:0575
https://access.redhat.com/security/cve/CVE-2023-3567
https://bugzilla.redhat.com/show_bug.cgi?id=2221463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567
https://git.kernel.org/linus/226fae124b2dac217ea5436060d623ff3385bc34 (6.2-rc7)
https://linux.oracle.com/cve/CVE-2023-3567.html
https://linux.oracle.com/errata/ELSA-2023-12792.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3567
https://ubuntu.com/security/notices/USN-6309-1
https://ubuntu.com/security/notices/USN-6327-1
https://ubuntu.com/security/notices/USN-6341-1
https://www.cve.org/CVERecord?id=CVE-2023-3567
https://www.spinics.net/lists/stable-commits/msg285184.html
|
| kernel-headers |
CVE-2023-35824 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-35824
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35824
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/5abda7a16698d4d1f47af1168d8fa2c640116b4a (6.4-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a
https://linux.oracle.com/cve/CVE-2023-35824.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/
https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947@xs4all.nl/
https://lore.kernel.org/lkml/20230318081506.795147-1-zyytlz.wz%40163.com/
https://lore.kernel.org/lkml/20230318081506.795147-1-zyytlz.wz@163.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-35824
https://security.netapp.com/advisory/ntap-20230803-0002/
https://ubuntu.com/security/notices/USN-6283-1
https://ubuntu.com/security/notices/USN-6300-1
https://ubuntu.com/security/notices/USN-6311-1
https://ubuntu.com/security/notices/USN-6332-1
https://ubuntu.com/security/notices/USN-6340-1
https://ubuntu.com/security/notices/USN-6340-2
https://ubuntu.com/security/notices/USN-6347-1
https://ubuntu.com/security/notices/USN-6349-1
https://ubuntu.com/security/notices/USN-6357-1
https://ubuntu.com/security/notices/USN-6397-1
https://www.cve.org/CVERecord?id=CVE-2023-35824
|
| kernel-headers |
CVE-2023-35825 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-35825
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://linux.oracle.com/cve/CVE-2023-35825.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://nvd.nist.gov/vuln/detail/CVE-2023-35825
https://www.cve.org/CVERecord?id=CVE-2023-35825
|
| kernel-headers |
CVE-2023-3772 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2023/08/10/1
http://www.openwall.com/lists/oss-security/2023/08/10/3
https://access.redhat.com/errata/RHSA-2023:6583
https://access.redhat.com/errata/RHSA-2023:6901
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/errata/RHSA-2024:0412
https://access.redhat.com/errata/RHSA-2024:0575
https://access.redhat.com/security/cve/CVE-2023-3772
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://bugzilla.redhat.com/show_bug.cgi?id=2218943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://linux.oracle.com/cve/CVE-2023-3772.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/netdev/20230721145103.2714073-1-linma@zju.edu.cn/
https://nvd.nist.gov/vuln/detail/CVE-2023-3772
https://ubuntu.com/security/notices/USN-6415-1
https://ubuntu.com/security/notices/USN-6439-1
https://ubuntu.com/security/notices/USN-6439-2
https://ubuntu.com/security/notices/USN-6440-1
https://ubuntu.com/security/notices/USN-6440-2
https://ubuntu.com/security/notices/USN-6440-3
https://ubuntu.com/security/notices/USN-6462-1
https://ubuntu.com/security/notices/USN-6462-2
https://ubuntu.com/security/notices/USN-6464-1
https://ubuntu.com/security/notices/USN-6465-1
https://ubuntu.com/security/notices/USN-6465-2
https://ubuntu.com/security/notices/USN-6465-3
https://ubuntu.com/security/notices/USN-6466-1
https://ubuntu.com/security/notices/USN-6516-1
https://ubuntu.com/security/notices/USN-6520-1
https://www.cve.org/CVERecord?id=CVE-2023-3772
https://www.debian.org/security/2023/dsa-5492
https://www.openwall.com/lists/oss-security/2023/08/10/1
|
| kernel-headers |
CVE-2023-38409 |
MEDIUM |
3.10.0-1160.108.1.el7 |
3.10.0-1160.114.2.el7 |
https://access.redhat.com/security/cve/CVE-2023-38409
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38409
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d
https://linux.oracle.com/cve/CVE-2023-38409.html
https://linux.oracle.com/errata/ELSA-2024-12094.html
https://nvd.nist.gov/vuln/detail/CVE-2023-38409
https://www.cve.org/CVERecord?id=CVE-2023-38409
|
| kernel-headers |
CVE-2023-39192 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-39192
https://bugzilla.redhat.com/show_bug.cgi?id=2226784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39192
https://git.kernel.org/linus/69c5d284f67089b4750d28ff6ac6f52ec224b330 (6.6-rc1)
https://github.com/grigoritchy/pocs/tree/main/linux/CVE-2023-39192
https://linux.oracle.com/cve/CVE-2023-39192.html
https://linux.oracle.com/errata/ELSA-2023-13019.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/all/20230828132107.18376-1-wander@redhat.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-39192
https://ubuntu.com/security/notices/USN-6494-1
https://ubuntu.com/security/notices/USN-6494-2
https://ubuntu.com/security/notices/USN-6532-1
https://ubuntu.com/security/notices/USN-6534-1
https://ubuntu.com/security/notices/USN-6534-2
https://ubuntu.com/security/notices/USN-6534-3
https://ubuntu.com/security/notices/USN-6548-1
https://ubuntu.com/security/notices/USN-6548-2
https://ubuntu.com/security/notices/USN-6548-3
https://ubuntu.com/security/notices/USN-6548-4
https://ubuntu.com/security/notices/USN-6548-5
https://ubuntu.com/security/notices/USN-6549-1
https://ubuntu.com/security/notices/USN-6549-2
https://ubuntu.com/security/notices/USN-6549-3
https://ubuntu.com/security/notices/USN-6549-4
https://ubuntu.com/security/notices/USN-6549-5
https://ubuntu.com/security/notices/USN-6635-1
https://www.cve.org/CVERecord?id=CVE-2023-39192
https://www.zerodayinitiative.com/advisories/ZDI-23-1490/
https://www.zerodayinitiative.com/advisories/ZDI-CAN-18408/
|
| kernel-headers |
CVE-2023-39193 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-39193
https://bugzilla.redhat.com/show_bug.cgi?id=2226787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39193
https://git.kernel.org/linus/e99476497687ef9e850748fe6d232264f30bc8f9 (6.6-rc1)
https://linux.oracle.com/cve/CVE-2023-39193.html
https://linux.oracle.com/errata/ELSA-2023-13019.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2023-39193
https://ubuntu.com/security/notices/USN-6494-1
https://ubuntu.com/security/notices/USN-6494-2
https://ubuntu.com/security/notices/USN-6532-1
https://ubuntu.com/security/notices/USN-6534-1
https://ubuntu.com/security/notices/USN-6534-2
https://ubuntu.com/security/notices/USN-6534-3
https://ubuntu.com/security/notices/USN-6548-1
https://ubuntu.com/security/notices/USN-6548-2
https://ubuntu.com/security/notices/USN-6548-3
https://ubuntu.com/security/notices/USN-6548-4
https://ubuntu.com/security/notices/USN-6548-5
https://ubuntu.com/security/notices/USN-6549-1
https://ubuntu.com/security/notices/USN-6549-2
https://ubuntu.com/security/notices/USN-6549-3
https://ubuntu.com/security/notices/USN-6549-4
https://ubuntu.com/security/notices/USN-6549-5
https://ubuntu.com/security/notices/USN-6635-1
https://www.cve.org/CVERecord?id=CVE-2023-39193
https://www.zerodayinitiative.com/advisories/ZDI-23-1491/
https://www.zerodayinitiative.com/advisories/ZDI-CAN-18866/
|
| kernel-headers |
CVE-2023-39197 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-39197
https://bugzilla.redhat.com/show_bug.cgi?id=2218342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39197
https://git.kernel.org/linus/ff0a3a7d52ff7282dbd183e7fc29a1fe386b0c30 (6.5-rc1)
https://nvd.nist.gov/vuln/detail/CVE-2023-39197
https://www.cve.org/CVERecord?id=CVE-2023-39197
|
| kernel-headers |
CVE-2023-39198 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-39198
https://bugzilla.redhat.com/show_bug.cgi?id=2218332
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39198
https://git.kernel.org/linus/c611589b4259ed63b9b77be6872b1ce07ec0ac16 (6.5-rc7)
https://nvd.nist.gov/vuln/detail/CVE-2023-39198
https://ubuntu.com/security/notices/USN-6534-1
https://ubuntu.com/security/notices/USN-6534-2
https://ubuntu.com/security/notices/USN-6534-3
https://ubuntu.com/security/notices/USN-6549-1
https://ubuntu.com/security/notices/USN-6549-2
https://ubuntu.com/security/notices/USN-6549-3
https://ubuntu.com/security/notices/USN-6549-4
https://ubuntu.com/security/notices/USN-6549-5
https://www.cve.org/CVERecord?id=CVE-2023-39198
|
| kernel-headers |
CVE-2023-4010 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-4010
https://bugzilla.redhat.com/show_bug.cgi?id=2227726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4010
https://github.com/wanrenmi/a-usb-kernel-bug
https://github.com/wanrenmi/a-usb-kernel-bug/issues/1
https://nvd.nist.gov/vuln/detail/CVE-2023-4010
https://www.cve.org/CVERecord?id=CVE-2023-4010
|
| kernel-headers |
CVE-2023-40283 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/security/cve/CVE-2023-40283
https://bugzilla.redhat.com/2087568
https://bugzilla.redhat.com/2144379
https://bugzilla.redhat.com/2161310
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2187813
https://bugzilla.redhat.com/2187931
https://bugzilla.redhat.com/2231800
https://bugzilla.redhat.com/2237757
https://bugzilla.redhat.com/2244723
https://bugzilla.redhat.com/2245514
https://bugzilla.redhat.com/2246944
https://bugzilla.redhat.com/2246945
https://bugzilla.redhat.com/2253611
https://bugzilla.redhat.com/2253614
https://bugzilla.redhat.com/2253908
https://bugzilla.redhat.com/2254052
https://bugzilla.redhat.com/2254053
https://bugzilla.redhat.com/2254054
https://bugzilla.redhat.com/2255139
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.10
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283
https://errata.almalinux.org/8/ALSA-2024-0897.html
https://git.kernel.org/linus/1728137b33c00d5a2b5110ed7aafb42e7c32e4a1 (6.5-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1
https://github.com/torvalds/linux/commit/1728137b33c00d5a2b5110ed7aafb42e7c32e4a1
https://linux.oracle.com/cve/CVE-2023-40283.html
https://linux.oracle.com/errata/ELSA-2024-12169.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2023-40283
https://security.netapp.com/advisory/ntap-20231020-0007/
https://ubuntu.com/security/notices/USN-6343-1
https://ubuntu.com/security/notices/USN-6383-1
https://ubuntu.com/security/notices/USN-6385-1
https://ubuntu.com/security/notices/USN-6386-1
https://ubuntu.com/security/notices/USN-6386-2
https://ubuntu.com/security/notices/USN-6386-3
https://ubuntu.com/security/notices/USN-6387-1
https://ubuntu.com/security/notices/USN-6387-2
https://ubuntu.com/security/notices/USN-6388-1
https://ubuntu.com/security/notices/USN-6396-1
https://ubuntu.com/security/notices/USN-6396-2
https://ubuntu.com/security/notices/USN-6396-3
https://ubuntu.com/security/notices/USN-6466-1
https://www.cve.org/CVERecord?id=CVE-2023-40283
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
|
| kernel-headers |
CVE-2023-4132 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6901
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/errata/RHSA-2024:0575
https://access.redhat.com/errata/RHSA-2024:0724
https://access.redhat.com/security/cve/CVE-2023-4132
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://bugzilla.redhat.com/show_bug.cgi?id=2221707
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4132
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/6f489a966fbeb0da63d45c2c66a8957eab604bf6 (6.5-rc1)
https://git.kernel.org/linus/ebad8e731c1c06adf04621d6fd327b860c0861b5 (6.3-rc1)
https://linux.oracle.com/cve/CVE-2023-4132.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4132
https://security.netapp.com/advisory/ntap-20231020-0005/
https://ubuntu.com/security/notices/USN-6416-1
https://ubuntu.com/security/notices/USN-6416-2
https://ubuntu.com/security/notices/USN-6416-3
https://ubuntu.com/security/notices/USN-6445-1
https://ubuntu.com/security/notices/USN-6445-2
https://ubuntu.com/security/notices/USN-6462-1
https://ubuntu.com/security/notices/USN-6462-2
https://ubuntu.com/security/notices/USN-6464-1
https://ubuntu.com/security/notices/USN-6466-1
https://ubuntu.com/security/notices/USN-6520-1
https://www.cve.org/CVERecord?id=CVE-2023-4132
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
|
| kernel-headers |
CVE-2023-4133 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-4133
https://bugzilla.redhat.com/show_bug.cgi?id=2221702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4133
https://git.kernel.org/linus/e50b9b9e8610d47b7c22529443e45a16b1ea3a15 (6.3)
https://nvd.nist.gov/vuln/detail/CVE-2023-4133
https://www.cve.org/CVERecord?id=CVE-2023-4133
|
| kernel-headers |
CVE-2023-4244 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-4244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://linux.oracle.com/cve/CVE-2023-4244.html
https://linux.oracle.com/errata/ELSA-2024-12154.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/netdev/20230810070830.24064-1-pablo@netfilter.org/
https://lore.kernel.org/netdev/20230815223011.7019-1-fw@strlen.de/
https://nvd.nist.gov/vuln/detail/CVE-2023-4244
https://ubuntu.com/security/notices/USN-6443-1
https://ubuntu.com/security/notices/USN-6444-1
https://ubuntu.com/security/notices/USN-6444-2
https://ubuntu.com/security/notices/USN-6445-1
https://ubuntu.com/security/notices/USN-6445-2
https://ubuntu.com/security/notices/USN-6446-1
https://ubuntu.com/security/notices/USN-6446-2
https://ubuntu.com/security/notices/USN-6446-3
https://ubuntu.com/security/notices/USN-6461-1
https://ubuntu.com/security/notices/USN-6466-1
https://ubuntu.com/security/notices/USN-6503-1
https://ubuntu.com/security/notices/USN-6537-1
https://ubuntu.com/security/notices/USN-6572-1
https://ubuntu.com/security/notices/USN-6681-1
https://ubuntu.com/security/notices/USN-6681-2
https://ubuntu.com/security/notices/USN-6681-3
https://www.cve.org/CVERecord?id=CVE-2023-4244
|
| kernel-headers |
CVE-2023-42755 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-42755
https://bugzilla.redhat.com/show_bug.cgi?id=2239847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42755
https://git.kernel.org/linus/265b4da82dbf5df04bee5a5d46b7474b1aaf326a (6.3-rc1)
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/all/CADW8OBtkAf+nGokhD9zCFcmiebL1SM8bJp_oo=pE02BknG9qnQ@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-42755
https://seclists.org/oss-sec/2023/q3/229
https://ubuntu.com/security/notices/USN-6439-1
https://ubuntu.com/security/notices/USN-6439-2
https://ubuntu.com/security/notices/USN-6440-1
https://ubuntu.com/security/notices/USN-6440-2
https://ubuntu.com/security/notices/USN-6440-3
https://ubuntu.com/security/notices/USN-6441-1
https://ubuntu.com/security/notices/USN-6441-2
https://ubuntu.com/security/notices/USN-6441-3
https://ubuntu.com/security/notices/USN-6442-1
https://ubuntu.com/security/notices/USN-6443-1
https://ubuntu.com/security/notices/USN-6444-1
https://ubuntu.com/security/notices/USN-6444-2
https://ubuntu.com/security/notices/USN-6445-1
https://ubuntu.com/security/notices/USN-6445-2
https://ubuntu.com/security/notices/USN-6446-1
https://ubuntu.com/security/notices/USN-6446-2
https://ubuntu.com/security/notices/USN-6446-3
https://ubuntu.com/security/notices/USN-6460-1
https://ubuntu.com/security/notices/USN-6466-1
https://www.cve.org/CVERecord?id=CVE-2023-42755
|
| kernel-headers |
CVE-2023-4387 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-4387
https://bugzilla.redhat.com/show_bug.cgi?id=2219270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4387
https://git.kernel.org/linus/9e7fef9521e73ca8afd7da9e58c14654b02dfad8 (5.18)
https://github.com/torvalds/linux/commit/9e7fef9521e73ca8afd7da9e58c14654b02dfad8
https://linux.oracle.com/cve/CVE-2023-4387.html
https://linux.oracle.com/errata/ELSA-2023-12842.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4387
https://ubuntu.com/security/notices/USN-6388-1
https://www.cve.org/CVERecord?id=CVE-2023-4387
|
| kernel-headers |
CVE-2023-4459 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2024:0412
https://access.redhat.com/errata/RHSA-2024:1250
https://access.redhat.com/errata/RHSA-2024:1306
https://access.redhat.com/security/cve/CVE-2023-4459
https://bugzilla.redhat.com/show_bug.cgi?id=2219268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4459
https://git.kernel.org/linus/edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd (5.18)
https://github.com/torvalds/linux/commit/edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd
https://linux.oracle.com/cve/CVE-2023-4459.html
https://linux.oracle.com/errata/ELSA-2023-12842.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4459
https://ubuntu.com/security/notices/USN-6388-1
https://www.cve.org/CVERecord?id=CVE-2023-4459
|
| kernel-headers |
CVE-2023-45862 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-45862
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45862
https://git.kernel.org/linus/ce33e64c1788912976b61314b56935abd4bc97ef
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce33e64c1788912976b61314b56935abd4bc97ef
https://linux.oracle.com/cve/CVE-2023-45862.html
https://linux.oracle.com/errata/ELSA-2023-13019.html
https://lore.kernel.org/r/20230204183546.never.849-kees@kernel.org
https://nvd.nist.gov/vuln/detail/CVE-2023-45862
https://security.netapp.com/advisory/ntap-20231116-0004/
https://ubuntu.com/security/notices/USN-6494-1
https://ubuntu.com/security/notices/USN-6494-2
https://ubuntu.com/security/notices/USN-6532-1
https://www.cve.org/CVERecord?id=CVE-2023-45862
|
| kernel-headers |
CVE-2023-45863 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-45863
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863
https://git.kernel.org/linus/3bb2a01caa813d3a1845d378bbe4169ef280d394
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3bb2a01caa813d3a1845d378bbe4169ef280d394
https://linux.oracle.com/cve/CVE-2023-45863.html
https://linux.oracle.com/errata/ELSA-2024-12154.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2023-45863
https://ubuntu.com/security/notices/USN-6577-1
https://ubuntu.com/security/notices/USN-6602-1
https://ubuntu.com/security/notices/USN-6604-1
https://ubuntu.com/security/notices/USN-6604-2
https://ubuntu.com/security/notices/USN-6625-1
https://ubuntu.com/security/notices/USN-6625-2
https://ubuntu.com/security/notices/USN-6625-3
https://www.cve.org/CVERecord?id=CVE-2023-45863
|
| kernel-headers |
CVE-2023-51042 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-51042
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042
https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628
https://nvd.nist.gov/vuln/detail/CVE-2023-51042
https://www.cve.org/CVERecord?id=CVE-2023-51042
|
| kernel-headers |
CVE-2023-51043 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-51043
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5
https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255
https://nvd.nist.gov/vuln/detail/CVE-2023-51043
https://www.cve.org/CVERecord?id=CVE-2023-51043
|
| kernel-headers |
CVE-2023-51779 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-51779
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779
https://git.kernel.org/linus/2e07e8348ea454615e268222ae3fc240421be768 (6.7-rc7)
https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768
https://nvd.nist.gov/vuln/detail/CVE-2023-51779
https://ubuntu.com/security/notices/USN-6606-1
https://ubuntu.com/security/notices/USN-6680-1
https://ubuntu.com/security/notices/USN-6680-2
https://ubuntu.com/security/notices/USN-6681-1
https://ubuntu.com/security/notices/USN-6681-2
https://ubuntu.com/security/notices/USN-6681-3
https://ubuntu.com/security/notices/USN-6686-1
https://ubuntu.com/security/notices/USN-6686-2
https://www.cve.org/CVERecord?id=CVE-2023-51779
|
| kernel-headers |
CVE-2023-51780 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-51780
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780
https://git.kernel.org/linus/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3 (6.7-rc6)
https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3
https://linux.oracle.com/cve/CVE-2023-51780.html
https://linux.oracle.com/errata/ELSA-2024-12193.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://lore.kernel.org/all/20231209094210.GA403126@v4bel-B760M-AORUS-ELITE-AX/
https://nvd.nist.gov/vuln/detail/CVE-2023-51780
https://ubuntu.com/security/notices/USN-6639-1
https://ubuntu.com/security/notices/USN-6646-1
https://ubuntu.com/security/notices/USN-6647-1
https://ubuntu.com/security/notices/USN-6647-2
https://ubuntu.com/security/notices/USN-6651-1
https://ubuntu.com/security/notices/USN-6651-2
https://ubuntu.com/security/notices/USN-6651-3
https://ubuntu.com/security/notices/USN-6652-1
https://ubuntu.com/security/notices/USN-6653-1
https://ubuntu.com/security/notices/USN-6653-2
https://ubuntu.com/security/notices/USN-6653-3
https://ubuntu.com/security/notices/USN-6653-4
https://ubuntu.com/security/notices/USN-6681-1
https://ubuntu.com/security/notices/USN-6681-2
https://ubuntu.com/security/notices/USN-6681-3
https://www.cve.org/CVERecord?id=CVE-2023-51780
|
| kernel-headers |
CVE-2023-52434 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52434
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=17a0f64cc02d4972e21c733d9f21d1c512963afa
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=af1689a9b7701d9907dfc84d2a4b57c4bc907144
https://git.kernel.org/stable/c/13fb0fc4917621f3dfa285a27eaf7151d770b5e5
https://git.kernel.org/stable/c/17a0f64cc02d4972e21c733d9f21d1c512963afa
https://git.kernel.org/stable/c/1ae3c59355dc9882e09c020afe8ffbd895ad0f29
https://git.kernel.org/stable/c/890bc4fac3c0973a49cac35f634579bebba7fe48
https://git.kernel.org/stable/c/af1689a9b7701d9907dfc84d2a4b57c4bc907144
https://lore.kernel.org/linux-cve-announce/2024022033-makeshift-flammable-cb72@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52434
https://www.cve.org/CVERecord?id=CVE-2023-52434
|
| kernel-headers |
CVE-2023-52439 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52439
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52439
https://git.kernel.org/linus/0c9ae0b8605078eafc3bea053cc78791e97ba2e2 (6.8-rc1)
https://git.kernel.org/stable/c/0c9ae0b8605078eafc3bea053cc78791e97ba2e2
https://git.kernel.org/stable/c/17a8519cb359c3b483fb5c7367efa9a8a508bdea
https://git.kernel.org/stable/c/3174e0f7de1ba392dc191625da83df02d695b60c
https://git.kernel.org/stable/c/35f102607054faafe78d2a6994b18d5d9d6e92ad
https://git.kernel.org/stable/c/5cf604ee538ed0c467abe3b4cda5308a6398f0f7
https://git.kernel.org/stable/c/5e0be1229ae199ebb90b33102f74a0f22d152570
https://git.kernel.org/stable/c/913205930da6213305616ac539447702eaa85e41
https://git.kernel.org/stable/c/e93da893d52d82d57fc0db2ca566024e0f26ff50
https://lore.kernel.org/linux-cve-announce/2024022026-wobbling-jumbo-748e@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52439
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52439
|
| kernel-headers |
CVE-2023-52450 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52450
https://git.kernel.org/stable/c/1692cf434ba13ee212495b5af795b6a07e986ce4
https://git.kernel.org/stable/c/3d6f4a78b104c65e4256c3776c9949f49a1b459e
https://git.kernel.org/stable/c/bf1bf09e6b599758851457f3999779622a48d015
https://lore.kernel.org/linux-cve-announce/2024022256-CVE-2023-52450-48ba@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52450
https://www.cve.org/CVERecord?id=CVE-2023-52450
|
| kernel-headers |
CVE-2023-52451 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52451
https://git.kernel.org/stable/c/026fd977dc50ff4a5e09bfb0603557f104d3f3a0
https://git.kernel.org/stable/c/708a4b59baad96c4718dc0bd3a3427d3ab22fedc
https://git.kernel.org/stable/c/999a27b3ce9a69d54ccd5db000ec3a447bc43e6d
https://git.kernel.org/stable/c/9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7
https://git.kernel.org/stable/c/b582aa1f66411d4adcc1aa55b8c575683fb4687e
https://git.kernel.org/stable/c/bb79613a9a704469ddb8d6c6029d532a5cea384c
https://git.kernel.org/stable/c/bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5
https://git.kernel.org/stable/c/df16afba2378d985359812c865a15c05c70a967e
https://lore.kernel.org/linux-cve-announce/2024022257-CVE-2023-52451-7bdb@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52451
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52451
|
| kernel-headers |
CVE-2023-52455 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52455
https://git.kernel.org/stable/c/5e23e283910c9f30248732ae0770bcb0c9438abf
https://git.kernel.org/stable/c/98b8a550da83cc392a14298c4b3eaaf0332ae6ad
https://git.kernel.org/stable/c/bb57f6705960bebeb832142ce9abf43220c3eab1
https://lore.kernel.org/linux-cve-announce/2024022331-CVE-2023-52455-a28f@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52455
https://www.cve.org/CVERecord?id=CVE-2023-52455
|
| kernel-headers |
CVE-2023-52458 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458
https://git.kernel.org/stable/c/5010c27120962c85d2f421d2cf211791c9603503
https://git.kernel.org/stable/c/6f64f866aa1ae6975c95d805ed51d7e9433a0016
https://git.kernel.org/stable/c/bcdc288e7bc008daf38ef0401b53e4a8bb61bbe5
https://git.kernel.org/stable/c/cb16cc1abda18a9514106d2ac8c8d7abc0be5ed8
https://git.kernel.org/stable/c/ef31cc87794731ffcb578a195a2c47d744e25fb8
https://lore.kernel.org/linux-cve-announce/2024022332-CVE-2023-52458-d1cd@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52458
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52458
|
| kernel-headers |
CVE-2023-52461 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52461
https://git.kernel.org/stable/c/1470d173925d697b497656b93f7c5bddae2e64b2
https://git.kernel.org/stable/c/2bbe6ab2be53858507f11f99f856846d04765ae3
https://lore.kernel.org/linux-cve-announce/2024022334-CVE-2023-52461-a619@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52461
https://www.cve.org/CVERecord?id=CVE-2023-52461
|
| kernel-headers |
CVE-2023-52462 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52462
https://git.kernel.org/stable/c/2757f17972d87773b3677777f5682510f13c66ef
https://git.kernel.org/stable/c/40617d45ea05535105e202a8a819e388a2b1f036
https://git.kernel.org/stable/c/67e6707f07354ed1acb4e65552e97c60cf9d69cf
https://git.kernel.org/stable/c/8dc15b0670594543c356567a1a45b0182ec63174
https://git.kernel.org/stable/c/ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae
https://git.kernel.org/stable/c/fc3e3c50a0a4cac1463967c110686189e4a59104
https://lore.kernel.org/linux-cve-announce/2024022335-CVE-2023-52462-b663@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52462
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52462
|
| kernel-headers |
CVE-2023-52463 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52463
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52463
https://git.kernel.org/stable/c/0049fe7e4a85849bdd778cdb72e51a791ff3d737
https://git.kernel.org/stable/c/0e8d2444168dd519fea501599d150e62718ed2fe
https://git.kernel.org/stable/c/2aa141f8bc580f8f9811dfe4e0e6009812b73826
https://git.kernel.org/stable/c/94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8
https://git.kernel.org/stable/c/d4a714873db0866cc471521114eeac4a5072d548
https://git.kernel.org/stable/c/d4a9aa7db574a0da64307729cc031fb68597aa8b
https://lore.kernel.org/linux-cve-announce/2024022335-CVE-2023-52463-6195@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52463
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52463
|
| kernel-headers |
CVE-2023-52465 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52465
https://git.kernel.org/linus/88f04bc3e737155e13caddf0ba8ed19db87f0212 (6.8-rc1)
https://git.kernel.org/stable/c/88f04bc3e737155e13caddf0ba8ed19db87f0212
https://git.kernel.org/stable/c/bd3d2ec447ede9da822addf3960a5f4275e3ae76
https://git.kernel.org/stable/c/e2717302fbc20f148bcda362facee0444b949a3a
https://nvd.nist.gov/vuln/detail/CVE-2023-52465
https://www.cve.org/CVERecord?id=CVE-2023-52465
|
| kernel-headers |
CVE-2023-52466 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52466
https://git.kernel.org/linus/3171e46d677a668eed3086da78671f1e4f5b8405 (6.8-rc1)
https://git.kernel.org/stable/c/3171e46d677a668eed3086da78671f1e4f5b8405
https://git.kernel.org/stable/c/5b3e25efe16e06779a9a7c7610217c1b921ec179
https://git.kernel.org/stable/c/bd26159dcaaa3e9a927070efd348e7ce7e5ee933
https://nvd.nist.gov/vuln/detail/CVE-2023-52466
https://www.cve.org/CVERecord?id=CVE-2023-52466
|
| kernel-headers |
CVE-2023-52467 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52467
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52467
https://git.kernel.org/linus/41673c66b3d0c09915698fec5c13b24336f18dd1 (6.8-rc1)
https://git.kernel.org/stable/c/3ef1130deee98997275904d9bfc37af75e1e906c
https://git.kernel.org/stable/c/41673c66b3d0c09915698fec5c13b24336f18dd1
https://git.kernel.org/stable/c/527e8c5f3d00299822612c495d5adf1f8f43c001
https://git.kernel.org/stable/c/7f2c410ac470959b88e03dadd94b7a0b71df7973
https://git.kernel.org/stable/c/927626a2073887ee30ba00633260d4d203f8e875
https://git.kernel.org/stable/c/c3e3a2144bf50877551138ffce9f7aa6ddfe385b
https://nvd.nist.gov/vuln/detail/CVE-2023-52467
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52467
|
| kernel-headers |
CVE-2023-52468 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52468
https://git.kernel.org/linus/93ec4a3b76404bce01bd5c9032bef5df6feb1d62 (6.8-rc1)
https://git.kernel.org/stable/c/0f1486dafca3398c4c46b9f6e6452fa27e73b559
https://git.kernel.org/stable/c/93ec4a3b76404bce01bd5c9032bef5df6feb1d62
https://git.kernel.org/stable/c/b57196a5ec5e4c0ffecde8348b085b778c7dce04
https://nvd.nist.gov/vuln/detail/CVE-2023-52468
https://www.cve.org/CVERecord?id=CVE-2023-52468
|
| kernel-headers |
CVE-2023-52469 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52469
https://git.kernel.org/linus/28dd788382c43b330480f57cd34cde0840896743 (6.8-rc1)
https://git.kernel.org/stable/c/28dd788382c43b330480f57cd34cde0840896743
https://git.kernel.org/stable/c/3426f059eacc33ecc676b0d66539297e1cfafd02
https://git.kernel.org/stable/c/35fa2394d26e919f63600ce631e6aefc95ec2706
https://git.kernel.org/stable/c/520e213a0b97b64735a13950e9371e0a5d7a5dc3
https://git.kernel.org/stable/c/8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e
https://git.kernel.org/stable/c/8b55b06e737feb2a645b0293ea27e38418876d63
https://git.kernel.org/stable/c/95084632a65d5c0d682a83b55935560bdcd2a1e3
https://git.kernel.org/stable/c/b6dcba02ee178282e0d28684d241e0b8462dea6a
https://nvd.nist.gov/vuln/detail/CVE-2023-52469
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52469
|
| kernel-headers |
CVE-2023-52470 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52470
https://git.kernel.org/linus/7a2464fac80d42f6f8819fed97a553e9c2f43310 (6.8-rc1)
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://nvd.nist.gov/vuln/detail/CVE-2023-52470
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52470
|
| kernel-headers |
CVE-2023-52471 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52471
https://git.kernel.org/stable/c/3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf
https://git.kernel.org/stable/c/3cd9b9bee33f39f6c6d52360fe381b89a7b12695
https://nvd.nist.gov/vuln/detail/CVE-2023-52471
https://www.cve.org/CVERecord?id=CVE-2023-52471
|
| kernel-headers |
CVE-2023-52472 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52472
https://git.kernel.org/linus/d872ca165cb67112f2841ef9c37d51ef7e63d1e4 (6.8-rc1)
https://git.kernel.org/stable/c/2831f4d3bfa68e64c5f83e96688be779c87b3511
https://git.kernel.org/stable/c/95ad8b6879e2e49d02e3bfc0e1fb46421633fe2a
https://git.kernel.org/stable/c/d872ca165cb67112f2841ef9c37d51ef7e63d1e4
https://nvd.nist.gov/vuln/detail/CVE-2023-52472
https://www.cve.org/CVERecord?id=CVE-2023-52472
|
| kernel-headers |
CVE-2023-52475 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52475
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://lore.kernel.org/linux-cve-announce/2024022918-CVE-2023-52475-442e@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52475
https://www.cve.org/CVERecord?id=CVE-2023-52475
|
| kernel-headers |
CVE-2023-52481 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52481
https://git.kernel.org/stable/c/32b0a4ffcaea44a00a61e40c0d1bcc50362aee25
https://git.kernel.org/stable/c/471470bc7052d28ce125901877dd10e4c048e513
https://git.kernel.org/stable/c/6e3ae2927b432a3b7c8374f14dbc1bd9ebe4372c
https://lore.kernel.org/linux-cve-announce/2024022922-CVE-2023-52481-99a8@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52481
https://www.cve.org/CVERecord?id=CVE-2023-52481
|
| kernel-headers |
CVE-2023-52482 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52482
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://lore.kernel.org/linux-cve-announce/2024022922-CVE-2023-52482-9375@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52482
https://www.cve.org/CVERecord?id=CVE-2023-52482
|
| kernel-headers |
CVE-2023-52483 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52483
https://git.kernel.org/stable/c/1db0724a01b558feb1ecae551782add1951a114a
https://git.kernel.org/stable/c/2405f64a95a7a094eb24cba9bcfaffd1ea264de4
https://git.kernel.org/stable/c/5093bbfc10ab6636b32728e35813cbd79feb063c
https://git.kernel.org/stable/c/6c52b12159049046483fdb0c411a0a1869c41a67
https://lore.kernel.org/linux-cve-announce/2024022923-CVE-2023-52483-5b9d@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52483
https://www.cve.org/CVERecord?id=CVE-2023-52483
|
| kernel-headers |
CVE-2023-52486 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52486
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-27-lee@kernel.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52486
https://www.cve.org/CVERecord?id=CVE-2023-52486
|
| kernel-headers |
CVE-2023-52487 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52487
https://git.kernel.org/stable/c/74cec142f89bf85c6c99c5db957da9f663f9f16f
https://git.kernel.org/stable/c/d76fdd31f953ac5046555171620f2562715e9b71
https://git.kernel.org/stable/c/e24d6f5a7f2d95a98a46257a5a5a5381d572894f
https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-28-lee@kernel.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52487
https://www.cve.org/CVERecord?id=CVE-2023-52487
|
| kernel-headers |
CVE-2023-52490 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52490
https://git.kernel.org/stable/c/3889a418b6eb9a1113fb989aaadecf2f64964767
https://git.kernel.org/stable/c/9128bfbc5c80d8f4874dd0a0424d1f5fb010df1b
https://git.kernel.org/stable/c/d1adb25df7111de83b64655a80b5a135adbded61
https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-31-lee@kernel.org/T
https://nvd.nist.gov/vuln/detail/CVE-2023-52490
https://www.cve.org/CVERecord?id=CVE-2023-52490
|
| kernel-headers |
CVE-2023-52492 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52492
https://git.kernel.org/stable/c/047fce470412ab64cb7345f9ff5d06919078ad79
https://git.kernel.org/stable/c/2ab32986a0b9e329eb7f8f04dd57cc127f797c08
https://git.kernel.org/stable/c/7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b
https://git.kernel.org/stable/c/9263fd2a63487c6d04cbb7b74a48fb12e1e352d0
https://git.kernel.org/stable/c/9de69732dde4e443c1c7f89acbbed2c45a6a8e17
https://git.kernel.org/stable/c/f5c24d94512f1b288262beda4d3dcb9629222fc7
https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-33-lee@kernel.org/T
https://nvd.nist.gov/vuln/detail/CVE-2023-52492
https://www.cve.org/CVERecord?id=CVE-2023-52492
|
| kernel-headers |
CVE-2023-52497 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52497
https://git.kernel.org/stable/c/33bf23c9940dbd3a22aad7f0cda4c84ed5701847
https://git.kernel.org/stable/c/3c12466b6b7bf1e56f9b32c366a3d83d87afb4de
https://git.kernel.org/stable/c/77cbc04a1a8610e303a0e0d74f2676667876a184
https://git.kernel.org/stable/c/a0180e940cf1aefa7d516e20b259ad34f7a8b379
https://git.kernel.org/stable/c/bffc4cc334c5bb31ded54bc3cfd651735a3cb79e
https://git.kernel.org/stable/c/f36d200a80a3ca025532ed60dd1ac21b620e14ae
https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-38-lee@kernel.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52497
https://www.cve.org/CVERecord?id=CVE-2023-52497
|
| kernel-headers |
CVE-2023-52498 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52498
https://git.kernel.org/stable/c/7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557
https://git.kernel.org/stable/c/9bd3dce27b01c51295b60e1433e1dadfb16649f7
https://git.kernel.org/stable/c/a1d62c775b07213c73f81ae842424c74dd14b5f0
https://git.kernel.org/stable/c/e1c9d32c98309ae764893a481552d3f99d46cb34
https://git.kernel.org/stable/c/e681e29d1f59a04ef773296e4bebb17b1b79f8fe
https://git.kernel.org/stable/c/f46eb832389f162ad13cb780d0b8cde93641990d
https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-39-lee@kernel.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52498
https://www.cve.org/CVERecord?id=CVE-2023-52498
|
| kernel-headers |
CVE-2023-52501 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52501
https://git.kernel.org/stable/c/344f2f3e61a90f0150c754796ec9a17fcaeec03d
https://git.kernel.org/stable/c/75fc9e99b3a71006720ad1e029db11a4b5c32d4a
https://git.kernel.org/stable/c/95a404bd60af6c4d9d8db01ad14fe8957ece31ca
https://git.kernel.org/stable/c/b08a4938229dbb530a35c41b83002a1457c6ff49
https://git.kernel.org/stable/c/cee5151c5410e868826b8afecfb356f3799ebea3
https://lore.kernel.org/linux-cve-announce/2024030248-CVE-2023-52501-75ba@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52501
https://www.cve.org/CVERecord?id=CVE-2023-52501
|
| kernel-headers |
CVE-2023-52518 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52518
https://git.kernel.org/stable/c/626535077ba9dc110787540d1fe24881094c15a1
https://git.kernel.org/stable/c/b938790e70540bf4f2e653dcd74b232494d06c8f
https://git.kernel.org/stable/c/eea5a8f0c3b7c884d2351e75fbdd0a3d7def5ae1
https://lore.kernel.org/linux-cve-announce/2024030251-CVE-2023-52518-bcfa@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52518
https://www.cve.org/CVERecord?id=CVE-2023-52518
|
| kernel-headers |
CVE-2023-52519 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52519
https://git.kernel.org/stable/c/60fb3f054c99608ddb1f2466c07108da6292951e
https://git.kernel.org/stable/c/8781fe259dd5a178fdd1069401bbd1437f9491c5
https://git.kernel.org/stable/c/8f02139ad9a7e6e5c05712f8c1501eebed8eacfd
https://git.kernel.org/stable/c/cdcc04e844a2d22d9d25cef1e8e504a174ea9f8f
https://lore.kernel.org/linux-cve-announce/2024030252-CVE-2023-52519-d53f@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52519
https://www.cve.org/CVERecord?id=CVE-2023-52519
|
| kernel-headers |
CVE-2023-52522 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52522
https://git.kernel.org/stable/c/147d89ee41434b97043c2dcb17a97dc151859baa
https://git.kernel.org/stable/c/25563b581ba3a1f263a00e8c9a97f5e7363be6fd
https://git.kernel.org/stable/c/2ea52a2fb8e87067e26bbab4efb8872639240eb0
https://git.kernel.org/stable/c/95eabb075a5902f4c0834ab1fb12dc35730c05af
https://git.kernel.org/stable/c/a75152d233370362eebedb2643592e7c883cc9fc
https://git.kernel.org/stable/c/f82aac8162871e87027692b36af335a2375d4580
https://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52522-6abd@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52522
https://www.cve.org/CVERecord?id=CVE-2023-52522
|
| kernel-headers |
CVE-2023-52528 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52528
https://git.kernel.org/stable/c/2a36d9e2995c8c3c3f179aab1215a69cff06cbed
https://git.kernel.org/stable/c/30bc4d7aebe33904b0f2d3aad4b4a9c6029ad0c5
https://git.kernel.org/stable/c/310f1c92f65ad905b7e81fe14de82d979ebbd825
https://git.kernel.org/stable/c/3e0af6eec1789fd11934164a7f4dbcad979855a4
https://git.kernel.org/stable/c/4931e80da9463b03bfe42be54a9a19f213b0f76d
https://git.kernel.org/stable/c/9ffc5018020fe646795a8dc1203224b8f776dc09
https://git.kernel.org/stable/c/cda10784a176d7192f08ecb518f777a4e9575812
https://git.kernel.org/stable/c/e9c65989920f7c28775ec4e0c11b483910fb67b8
https://lore.kernel.org/linux-cve-announce/2024030254-CVE-2023-52528-c33b@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52528
https://www.cve.org/CVERecord?id=CVE-2023-52528
|
| kernel-headers |
CVE-2023-52529 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52529
https://git.kernel.org/stable/c/bb0707fde7492121917fd9ddb43829e96ec0bb9e
https://git.kernel.org/stable/c/e1cd4004cde7c9b694bbdd8def0e02288ee58c74
https://git.kernel.org/stable/c/f237b17611fa3501f43f12d1cb64323e10fdcb4f
https://git.kernel.org/stable/c/f566efa7de1e35e6523f4acbaf85068a540be07d
https://lore.kernel.org/linux-cve-announce/2024030255-CVE-2023-52529-56ff@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52529
https://www.cve.org/CVERecord?id=CVE-2023-52529
|
| kernel-headers |
CVE-2023-52530 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52530
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://lore.kernel.org/linux-cve-announce/2024030255-CVE-2023-52530-ebf0@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52530
https://www.cve.org/CVERecord?id=CVE-2023-52530
|
| kernel-headers |
CVE-2023-52562 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52562
https://git.kernel.org/stable/c/46a9ea6681907a3be6b6b0d43776dccc62cad6cf
https://git.kernel.org/stable/c/51988be187b041e5355245957b0b9751fa382e0d
https://git.kernel.org/stable/c/a5569bb187521432f509b69dda7d29f78b2d38b0
https://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52562-da24@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52562
https://www.cve.org/CVERecord?id=CVE-2023-52562
|
| kernel-headers |
CVE-2023-52564 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52564
https://git.kernel.org/stable/c/29346e217b8ab8a52889b88f00b268278d6b7668
https://git.kernel.org/stable/c/2bff660e0ff349dee84dc4f6f6d10da4497f5b28
https://git.kernel.org/stable/c/6d5c8862932d31a810b6545f7d69ecc124402c6e
https://git.kernel.org/stable/c/a48d2bcd23f2c98d575bc2f9b7a3fbd16aeea9eb
https://git.kernel.org/stable/c/c61d0b87a7028c2c10faffc524d748334c7b9827
https://lore.kernel.org/linux-cve-announce/2024030253-CVE-2023-52564-88cb@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52564
https://www.cve.org/CVERecord?id=CVE-2023-52564
|
| kernel-headers |
CVE-2023-52565 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52565
https://git.kernel.org/stable/c/09635bf4cdd4adf2160198a6041bcc7ca46c0558
https://git.kernel.org/stable/c/41ebaa5e0eebea4c3bac96b72f9f8ae0d77c0bdb
https://git.kernel.org/stable/c/8bcf70d787f7d53a3b85ad394f926cfef3eed023
https://lore.kernel.org/linux-cve-announce/2024030254-CVE-2023-52565-07ce@gregkh/
https://nvd.nist.gov/vuln/detail/CVE-2023-52565
https://www.cve.org/CVERecord?id=CVE-2023-52565
|
| kernel-headers |
CVE-2023-52569 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52569
https://git.kernel.org/stable/c/2c58c3931ede7cd08cbecf1f1a4acaf0a04a41a9
https://git.kernel.org/stable/c/39c4a9522db0072570d602e9b365119e17fb9f4f
https://git.kernel.org/stable/c/d10fd53393cc5de4b9cf1a4b8f9984f0a037aa51
https://nvd.nist.gov/vuln/detail/CVE-2023-52569
https://www.cve.org/CVERecord?id=CVE-2023-52569
|
| kernel-headers |
CVE-2023-52570 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52570
https://git.kernel.org/stable/c/52093779b1830ac184a23848d971f06404cf513e
https://git.kernel.org/stable/c/c01b2e0ee22ef8b4dd7509a93aecc0ac0826bae4
https://git.kernel.org/stable/c/c777b11d34e0f47dbbc4b018ef65ad030f2b283a
https://lore.kernel.org/linux-cve-announce/2024030255-CVE-2023-52570-0789@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52570
https://www.cve.org/CVERecord?id=CVE-2023-52570
|
| kernel-headers |
CVE-2023-52574 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52574
https://git.kernel.org/stable/c/1779eb51b9cc628cee551f252701a85a2a50a457
https://git.kernel.org/stable/c/2f0acb0736ecc3eb85dc80ad2790d634dcb10b58
https://git.kernel.org/stable/c/492032760127251e5540a5716a70996bacf2a3fd
https://git.kernel.org/stable/c/a7fb47b9711101d2405b0eb1276fb1f9b9b270c7
https://git.kernel.org/stable/c/b44dd92e2afd89eb6e9d27616858e72a67bdc1a7
https://git.kernel.org/stable/c/c5f6478686bb45f453031594ae19b6c9723a780d
https://git.kernel.org/stable/c/cac50d9f5d876be32cb9aa21c74018468900284d
https://git.kernel.org/stable/c/cd05eec2ee0cc396813a32ef675634e403748255
https://lore.kernel.org/linux-cve-announce/2024030256-CVE-2023-52574-a423@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52574
https://www.cve.org/CVERecord?id=CVE-2023-52574
|
| kernel-headers |
CVE-2023-52575 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52575
https://git.kernel.org/stable/c/01b057b2f4cc2d905a0bd92195657dbd9a7005ab
https://git.kernel.org/stable/c/13ea4b92e8759d2f6c330a73cde31ad9c313021b
https://git.kernel.org/stable/c/adbcec23c8423e3d5df1839c5ae91599dcf703cb
https://git.kernel.org/stable/c/ae806c74c0634b0c23855066d8ba28d850fd1260
https://git.kernel.org/stable/c/e3cb8b2c391b1f287eb76df4ba37880f4ea56d8a
https://lore.kernel.org/linux-cve-announce/2024030256-CVE-2023-52575-34bf@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52575
https://www.cve.org/CVERecord?id=CVE-2023-52575
|
| kernel-headers |
CVE-2023-52578 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52578
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://lore.kernel.org/linux-cve-announce/2024030257-CVE-2023-52578-50cb@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52578
https://www.cve.org/CVERecord?id=CVE-2023-52578
|
| kernel-headers |
CVE-2023-52580 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52580
https://git.kernel.org/stable/c/488ea2a3e2666022f79abfdd7d12e8305fc27a40
https://git.kernel.org/stable/c/48e105a2a1a10adc21c0ae717969f5e8e990ba48
https://git.kernel.org/stable/c/75ad80ed88a182ab2ad5513e448cf07b403af5c3
https://git.kernel.org/stable/c/f90a7b9586d72f907092078a9f394733ca502cc9
https://lore.kernel.org/linux-cve-announce/2024030258-CVE-2023-52580-c37e@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52580
https://www.cve.org/CVERecord?id=CVE-2023-52580
|
| kernel-headers |
CVE-2023-52581 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52581
https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14
https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5
https://lore.kernel.org/linux-cve-announce/2024030258-CVE-2023-52581-2165@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52581
https://www.cve.org/CVERecord?id=CVE-2023-52581
|
| kernel-headers |
CVE-2023-52583 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52583
https://git.kernel.org/linus/b493ad718b1f0357394d2cdecbf00a44a36fa085 (6.8-rc1)
https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160
https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980
https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67
https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e
https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca
https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085
https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3
https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6
https://lore.kernel.org/linux-cve-announce/2024030641-CVE-2023-52583-fd38@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2023-52583
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52583
|
| kernel-headers |
CVE-2023-52587 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52587
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52587
https://git.kernel.org/linus/4f973e211b3b1c6d36f7c6a19239d258856749f9 (6.8-rc1)
https://git.kernel.org/stable/c/342258fb46d66c1b4c7e2c3717ac01e10c03cf18
https://git.kernel.org/stable/c/4c8922ae8eb8dcc1e4b7d1059d97a8334288d825
https://git.kernel.org/stable/c/4f973e211b3b1c6d36f7c6a19239d258856749f9
https://git.kernel.org/stable/c/5108a2dc2db5630fb6cd58b8be80a0c134bc310a
https://git.kernel.org/stable/c/615e3adc2042b7be4ad122a043fc9135e6342c90
https://git.kernel.org/stable/c/7c7bd4d561e9dc6f5b7df9e184974915f6701a89
https://git.kernel.org/stable/c/ac2630fd3c90ffec34a0bfc4d413668538b0e8f2
https://git.kernel.org/stable/c/ed790bd0903ed3352ebf7f650d910f49b7319b34
https://lore.kernel.org/linux-cve-announce/2024030644-CVE-2023-52587-5479@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2023-52587
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52587
|
| kernel-headers |
CVE-2023-52596 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52596
https://git.kernel.org/stable/c/15893975e9e382f8294ea8d926f08dc2d8d39ede
https://git.kernel.org/stable/c/2ae7081bc10123b187e36a4f3a8e53768de31489
https://git.kernel.org/stable/c/315552310c7de92baea4e570967066569937a843
https://lore.kernel.org/linux-cve-announce/2024030645-CVE-2023-52596-b98e@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2023-52596
https://www.cve.org/CVERecord?id=CVE-2023-52596
|
| kernel-headers |
CVE-2023-52597 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597
https://git.kernel.org/linus/b988b1bb0053c0dcd26187d29ef07566a565cf55 (6.8-rc1)
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://lore.kernel.org/linux-cve-announce/2024030646-CVE-2023-52597-2ed6@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2023-52597
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52597
|
| kernel-headers |
CVE-2023-52598 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52598
https://git.kernel.org/linus/8b13601d19c541158a6e18b278c00ba69ae37829 (6.8-rc1)
https://git.kernel.org/stable/c/02c6bbfb08bad78dd014e24c7b893723c15ec7a1
https://git.kernel.org/stable/c/28a1f492cb527f64593457a0a0f0d809b3f36c25
https://git.kernel.org/stable/c/6ccf904aac0292e1f6b1a1be6c407c414f7cf713
https://git.kernel.org/stable/c/6d0822f2cc9b153bf2df49a84599195a2e0d21a8
https://git.kernel.org/stable/c/7a4d6481fbdd661f9e40e95febb95e3dee82bad3
https://git.kernel.org/stable/c/856caf2730ea18cb39e95833719c02a02447dc0a
https://git.kernel.org/stable/c/8b13601d19c541158a6e18b278c00ba69ae37829
https://git.kernel.org/stable/c/bdce67df7f12fb0409fbc604ce7c4254703f56d4
https://lore.kernel.org/linux-cve-announce/2024030646-CVE-2023-52598-d0a2@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2023-52598
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52598
|
| kernel-headers |
CVE-2023-52606 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52606
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52606
https://git.kernel.org/linus/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59 (6.8-rc1)
https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf
https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c
https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414
https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd
https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59
https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e
https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678
https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b
https://lore.kernel.org/linux-cve-announce/2024030647-CVE-2023-52606-fdcc@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2023-52606
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52606
|
| kernel-headers |
CVE-2023-5717 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/security/cve/CVE-2023-5717
https://bugzilla.redhat.com/2087568
https://bugzilla.redhat.com/2144379
https://bugzilla.redhat.com/2161310
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2187813
https://bugzilla.redhat.com/2187931
https://bugzilla.redhat.com/2231800
https://bugzilla.redhat.com/2237757
https://bugzilla.redhat.com/2244723
https://bugzilla.redhat.com/2245514
https://bugzilla.redhat.com/2246944
https://bugzilla.redhat.com/2246945
https://bugzilla.redhat.com/2253611
https://bugzilla.redhat.com/2253614
https://bugzilla.redhat.com/2253908
https://bugzilla.redhat.com/2254052
https://bugzilla.redhat.com/2254053
https://bugzilla.redhat.com/2254054
https://bugzilla.redhat.com/2255139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717
https://errata.almalinux.org/8/ALSA-2024-0897.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06
https://kernel.dance/32671e3799ca2e4590773fd0e63aaa4229e50c06
https://linux.oracle.com/cve/CVE-2023-5717.html
https://linux.oracle.com/errata/ELSA-2024-12169.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://lore.kernel.org/all/1441336073-22750-7-git-send-email-sukadev@linux.vnet.ibm.com/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-5717
https://ubuntu.com/security/notices/USN-6494-1
https://ubuntu.com/security/notices/USN-6494-2
https://ubuntu.com/security/notices/USN-6497-1
https://ubuntu.com/security/notices/USN-6532-1
https://ubuntu.com/security/notices/USN-6534-1
https://ubuntu.com/security/notices/USN-6534-2
https://ubuntu.com/security/notices/USN-6534-3
https://ubuntu.com/security/notices/USN-6536-1
https://ubuntu.com/security/notices/USN-6537-1
https://ubuntu.com/security/notices/USN-6548-1
https://ubuntu.com/security/notices/USN-6548-2
https://ubuntu.com/security/notices/USN-6548-3
https://ubuntu.com/security/notices/USN-6548-4
https://ubuntu.com/security/notices/USN-6548-5
https://ubuntu.com/security/notices/USN-6549-1
https://ubuntu.com/security/notices/USN-6549-2
https://ubuntu.com/security/notices/USN-6549-3
https://ubuntu.com/security/notices/USN-6549-4
https://ubuntu.com/security/notices/USN-6549-5
https://ubuntu.com/security/notices/USN-6573-1
https://ubuntu.com/security/notices/USN-6635-1
https://www.cve.org/CVERecord?id=CVE-2023-5717
|
| kernel-headers |
CVE-2023-6040 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
http://www.openwall.com/lists/oss-security/2024/01/12/1
https://access.redhat.com/security/cve/CVE-2023-6040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040
https://nvd.nist.gov/vuln/detail/CVE-2023-6040
https://ubuntu.com/security/notices/USN-6605-1
https://ubuntu.com/security/notices/USN-6605-2
https://ubuntu.com/security/notices/USN-6607-1
https://ubuntu.com/security/notices/USN-6609-1
https://ubuntu.com/security/notices/USN-6609-2
https://ubuntu.com/security/notices/USN-6609-3
https://ubuntu.com/security/notices/USN-6628-1
https://ubuntu.com/security/notices/USN-6628-2
https://www.cve.org/CVERecord?id=CVE-2023-6040
https://www.openwall.com/lists/oss-security/2024/01/12/1
|
| kernel-headers |
CVE-2023-6240 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-6240
https://bugzilla.redhat.com/show_bug.cgi?id=2250843
https://nvd.nist.gov/vuln/detail/CVE-2023-6240
https://people.redhat.com/~hkario/marvin/
https://securitypitfalls.wordpress.com/2023/10/16/experiment-with-side-channel-attacks-yourself/
https://www.cve.org/CVERecord?id=CVE-2023-6240
|
| kernel-headers |
CVE-2023-6270 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-6270
https://bugzilla.redhat.com/show_bug.cgi?id=2256786
https://nvd.nist.gov/vuln/detail/CVE-2023-6270
https://www.cve.org/CVERecord?id=CVE-2023-6270
|
| kernel-headers |
CVE-2023-6606 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2024:0723
https://access.redhat.com/errata/RHSA-2024:0725
https://access.redhat.com/errata/RHSA-2024:0881
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/errata/RHSA-2024:1188
https://access.redhat.com/errata/RHSA-2024:1248
https://access.redhat.com/security/cve/CVE-2023-6606
https://bugzilla.kernel.org/show_bug.cgi?id=218218
https://bugzilla.redhat.com/2087568
https://bugzilla.redhat.com/2144379
https://bugzilla.redhat.com/2161310
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2187813
https://bugzilla.redhat.com/2187931
https://bugzilla.redhat.com/2231800
https://bugzilla.redhat.com/2237757
https://bugzilla.redhat.com/2244723
https://bugzilla.redhat.com/2245514
https://bugzilla.redhat.com/2246944
https://bugzilla.redhat.com/2246945
https://bugzilla.redhat.com/2253611
https://bugzilla.redhat.com/2253614
https://bugzilla.redhat.com/2253908
https://bugzilla.redhat.com/2254052
https://bugzilla.redhat.com/2254053
https://bugzilla.redhat.com/2254054
https://bugzilla.redhat.com/2255139
https://bugzilla.redhat.com/show_bug.cgi?id=2253611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6606
https://errata.almalinux.org/8/ALSA-2024-0897.html
https://linux.oracle.com/cve/CVE-2023-6606.html
https://linux.oracle.com/errata/ELSA-2024-12169.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/all/20231215225914.20065-1-pc@manguebit.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-6606
https://ubuntu.com/security/notices/USN-6602-1
https://ubuntu.com/security/notices/USN-6603-1
https://ubuntu.com/security/notices/USN-6604-1
https://ubuntu.com/security/notices/USN-6604-2
https://ubuntu.com/security/notices/USN-6605-1
https://ubuntu.com/security/notices/USN-6605-2
https://ubuntu.com/security/notices/USN-6606-1
https://ubuntu.com/security/notices/USN-6607-1
https://ubuntu.com/security/notices/USN-6608-1
https://ubuntu.com/security/notices/USN-6608-2
https://ubuntu.com/security/notices/USN-6609-1
https://ubuntu.com/security/notices/USN-6609-2
https://ubuntu.com/security/notices/USN-6609-3
https://ubuntu.com/security/notices/USN-6628-1
https://ubuntu.com/security/notices/USN-6628-2
https://ubuntu.com/security/notices/USN-6635-1
https://www.cve.org/CVERecord?id=CVE-2023-6606
|
| kernel-headers |
CVE-2023-6610 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2024:0723
https://access.redhat.com/errata/RHSA-2024:0724
https://access.redhat.com/errata/RHSA-2024:0725
https://access.redhat.com/errata/RHSA-2024:0881
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/errata/RHSA-2024:1248
https://access.redhat.com/security/cve/CVE-2023-6610
https://bugzilla.kernel.org/show_bug.cgi?id=218219
https://bugzilla.redhat.com/2087568
https://bugzilla.redhat.com/2144379
https://bugzilla.redhat.com/2161310
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2187813
https://bugzilla.redhat.com/2187931
https://bugzilla.redhat.com/2231800
https://bugzilla.redhat.com/2237757
https://bugzilla.redhat.com/2244723
https://bugzilla.redhat.com/2245514
https://bugzilla.redhat.com/2246944
https://bugzilla.redhat.com/2246945
https://bugzilla.redhat.com/2253611
https://bugzilla.redhat.com/2253614
https://bugzilla.redhat.com/2253908
https://bugzilla.redhat.com/2254052
https://bugzilla.redhat.com/2254053
https://bugzilla.redhat.com/2254054
https://bugzilla.redhat.com/2255139
https://bugzilla.redhat.com/show_bug.cgi?id=2253614
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6610
https://errata.almalinux.org/8/ALSA-2024-0897.html
https://linux.oracle.com/cve/CVE-2023-6610.html
https://linux.oracle.com/errata/ELSA-2024-12169.html
https://nvd.nist.gov/vuln/detail/CVE-2023-6610
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-6610
|
| kernel-headers |
CVE-2023-6931 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-6931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931
https://git.kernel.org/linus/382c27f4ed28f803b1f1473ac2d8db0afc795a1b (6.7-rc5)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b
https://kernel.dance/382c27f4ed28f803b1f1473ac2d8db0afc795a1b
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2023-6931
https://ubuntu.com/security/notices/USN-6602-1
https://ubuntu.com/security/notices/USN-6603-1
https://ubuntu.com/security/notices/USN-6604-1
https://ubuntu.com/security/notices/USN-6604-2
https://ubuntu.com/security/notices/USN-6605-1
https://ubuntu.com/security/notices/USN-6605-2
https://ubuntu.com/security/notices/USN-6606-1
https://ubuntu.com/security/notices/USN-6607-1
https://ubuntu.com/security/notices/USN-6608-1
https://ubuntu.com/security/notices/USN-6608-2
https://ubuntu.com/security/notices/USN-6609-1
https://ubuntu.com/security/notices/USN-6609-2
https://ubuntu.com/security/notices/USN-6609-3
https://ubuntu.com/security/notices/USN-6628-1
https://ubuntu.com/security/notices/USN-6628-2
https://ubuntu.com/security/notices/USN-6635-1
https://www.cve.org/CVERecord?id=CVE-2023-6931
|
| kernel-headers |
CVE-2023-6932 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
https://access.redhat.com/security/cve/CVE-2023-6932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932
https://git.kernel.org/linus/e2b706c691905fe78468c361aaabc719d0a496f1 (6.7-rc4)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1
https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2023-6932
https://ubuntu.com/security/notices/USN-6601-1
https://ubuntu.com/security/notices/USN-6602-1
https://ubuntu.com/security/notices/USN-6603-1
https://ubuntu.com/security/notices/USN-6604-1
https://ubuntu.com/security/notices/USN-6604-2
https://ubuntu.com/security/notices/USN-6605-1
https://ubuntu.com/security/notices/USN-6605-2
https://ubuntu.com/security/notices/USN-6607-1
https://ubuntu.com/security/notices/USN-6608-1
https://ubuntu.com/security/notices/USN-6608-2
https://ubuntu.com/security/notices/USN-6609-1
https://ubuntu.com/security/notices/USN-6609-2
https://ubuntu.com/security/notices/USN-6609-3
https://ubuntu.com/security/notices/USN-6628-1
https://ubuntu.com/security/notices/USN-6628-2
https://ubuntu.com/security/notices/USN-6635-1
https://ubuntu.com/security/notices/USN-6639-1
https://www.cve.org/CVERecord?id=CVE-2023-6932
|
| kernel-headers |
CVE-2023-7192 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2024:0723
https://access.redhat.com/errata/RHSA-2024:0725
https://access.redhat.com/errata/RHSA-2024:1188
https://access.redhat.com/errata/RHSA-2024:1250
https://access.redhat.com/errata/RHSA-2024:1306
https://access.redhat.com/security/cve/CVE-2023-7192
https://bugzilla.redhat.com/show_bug.cgi?id=2256279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7192
https://git.kernel.org/linus/ac4893980bbe79ce383daf9a0885666a30fe4c83 (6.3-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=ac4893980bbe79ce383daf9a0885666a30fe4c83
https://linux.oracle.com/cve/CVE-2023-7192.html
https://linux.oracle.com/errata/ELSA-2024-12193.html
https://nvd.nist.gov/vuln/detail/CVE-2023-7192
https://ubuntu.com/security/notices/USN-6645-1
https://ubuntu.com/security/notices/USN-6646-1
https://ubuntu.com/security/notices/USN-6647-1
https://ubuntu.com/security/notices/USN-6647-2
https://www.cve.org/CVERecord?id=CVE-2023-7192
|
| kernel-headers |
CVE-2024-0564 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-0564
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680513
https://bugzilla.redhat.com/show_bug.cgi?id=2258514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0564
https://link.springer.com/conference/wisa
https://nvd.nist.gov/vuln/detail/CVE-2024-0564
https://wisa.or.kr/accepted
https://www.cve.org/CVERecord?id=CVE-2024-0564
|
| kernel-headers |
CVE-2024-0841 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-0841
https://bugzilla.redhat.com/show_bug.cgi?id=2256490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841
https://lore.kernel.org/all/20240130210418.3771-1-osalvador@suse.de/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2024-0841
https://www.cve.org/CVERecord?id=CVE-2024-0841
|
| kernel-headers |
CVE-2024-1086 |
MEDIUM |
3.10.0-1160.108.1.el7 |
3.10.0-1160.114.2.el7 |
https://access.redhat.com/security/cve/CVE-2024-1086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086
https://git.kernel.org/linus/f342de4e2f33e0e39165d8639387aa6c19dff660 (6.8-rc2)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
https://nvd.nist.gov/vuln/detail/CVE-2024-1086
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2024-1086
|
| kernel-headers |
CVE-2024-21803 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-21803
https://bugzilla.openanolis.cn/show_bug.cgi?id=8081
https://nvd.nist.gov/vuln/detail/CVE-2024-21803
https://www.cve.org/CVERecord?id=CVE-2024-21803
|
| kernel-headers |
CVE-2024-22099 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-22099
https://bugzilla.openanolis.cn/show_bug.cgi?id=7956
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=6ec00b0737fe
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSXNF4RLEFLH35BFUQGYXRRVHHUIVBAE/
https://nvd.nist.gov/vuln/detail/CVE-2024-22099
https://www.cve.org/CVERecord?id=CVE-2024-22099
|
| kernel-headers |
CVE-2024-23307 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-23307
https://bugzilla.openanolis.cn/show_bug.cgi?id=7975
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23307
https://lore.kernel.org/linux-raid/20240112071017.16313-1-2045gemini@gmail.com/#r
https://lore.kernel.org/linux-raid/20240112071017.16313-1-2045gemini@gmail.com/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2024-23307
https://patchwork.kernel.org/project/linux-raid/patch/20240112071017.16313-1-2045gemini@gmail.com/
https://www.cve.org/CVERecord?id=CVE-2024-23307
|
| kernel-headers |
CVE-2024-23848 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-23848
https://lore.kernel.org/lkml/e9f42704-2f99-4f2c-ade5-f952e5fd53e5%40xs4all.nl/
https://nvd.nist.gov/vuln/detail/CVE-2024-23848
https://www.cve.org/CVERecord?id=CVE-2024-23848
|
| kernel-headers |
CVE-2024-23849 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-23849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23849
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=13e788deb734
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBVHM4LGMFIHBN4UBESYRFMYX3WUICV5/
https://lore.kernel.org/netdev/1705715319-19199-1-git-send-email-sharath.srinivasan%40oracle.com/
https://lore.kernel.org/netdev/CALGdzuoVdq-wtQ4Az9iottBqC5cv9ZhcE5q8N7LfYFvkRsOVcw%40mail.gmail.com
https://nvd.nist.gov/vuln/detail/CVE-2024-23849
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2024-23849
|
| kernel-headers |
CVE-2024-23850 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-23850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23850
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
https://lore.kernel.org/all/6a80cb4b32af89787dadee728310e5e2ca85343f.1705741883.git.wqu%40suse.com/
https://lore.kernel.org/lkml/CALGdzuo6awWdau3X=8XK547x2vX_-VoFmH1aPsqosRTQ5WzJVA%40mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2024-23850
https://www.cve.org/CVERecord?id=CVE-2024-23850
|
| kernel-headers |
CVE-2024-24857 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-24857
https://bugzilla.openanolis.cn/show_bug.cgi?id=8155
https://nvd.nist.gov/vuln/detail/CVE-2024-24857
https://www.cve.org/CVERecord?id=CVE-2024-24857
|
| kernel-headers |
CVE-2024-24858 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-24858
https://bugzilla.openanolis.cn/show_bug.cgi?id=8154
https://nvd.nist.gov/vuln/detail/CVE-2024-24858
https://www.cve.org/CVERecord?id=CVE-2024-24858
|
| kernel-headers |
CVE-2024-25739 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-25739
https://groups.google.com/g/syzkaller/c/Xl97YcQA4hg
https://nvd.nist.gov/vuln/detail/CVE-2024-25739
https://www.cve.org/CVERecord?id=CVE-2024-25739
https://www.spinics.net/lists/kernel/msg5074816.html
|
| kernel-headers |
CVE-2024-25740 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-25740
https://lore.kernel.org/lkml/0171b6cc-95ee-3538-913b-65a391a446b3%40huawei.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2024-25740
https://www.cve.org/CVERecord?id=CVE-2024-25740
|
| kernel-headers |
CVE-2024-25741 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-25741
https://nvd.nist.gov/vuln/detail/CVE-2024-25741
https://www.cve.org/CVERecord?id=CVE-2024-25741
https://www.spinics.net/lists/linux-usb/msg252167.html
|
| kernel-headers |
CVE-2024-25744 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-25744
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.7
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25744
https://git.kernel.org/linus/b82a8dbd3d2f4563156f7150c6f2ecab6e960b30 (6.7-rc5)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30
https://nvd.nist.gov/vuln/detail/CVE-2024-25744
https://ubuntu.com/security/notices/USN-6680-1
https://ubuntu.com/security/notices/USN-6680-2
https://www.cve.org/CVERecord?id=CVE-2024-25744
|
| kernel-headers |
CVE-2024-26589 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26589
https://git.kernel.org/stable/c/1b500d5d6cecf98dd6ca88bc9e7ae1783c83e6d3
https://git.kernel.org/stable/c/22c7fa171a02d310e3a3f6ed46a698ca8a0060ed
https://git.kernel.org/stable/c/29ffa63f21bcdcef3e36b03cccf9d0cd031f6ab0
https://git.kernel.org/stable/c/4108b86e324da42f7ed425bd71632fd844300dc8
https://git.kernel.org/stable/c/e8d3872b617c21100c5ee4f64e513997a68c2e3d
https://lore.kernel.org/linux-cve-announce/2024022257-CVE-2024-26589-0ee1@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2024-26589
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2024-26589
|
| kernel-headers |
CVE-2024-26591 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26591
https://git.kernel.org/stable/c/50ae82f080cf87e84828f066c31723b781d68f5b
https://git.kernel.org/stable/c/6cc9c0af0aa06f781fa515a1734b1a4239dfd2c0
https://git.kernel.org/stable/c/715d82ba636cb3629a6e18a33bb9dbe53f9936ee
https://git.kernel.org/stable/c/8c8bcd45e9b10eef12321f08d2e5be33d615509c
https://git.kernel.org/stable/c/a7b98aa10f895e2569403896f2d19b73b6c95653
https://lore.kernel.org/linux-cve-announce/2024022258-CVE-2024-26591-8b42@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2024-26591
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2024-26591
|
| kernel-headers |
CVE-2024-26595 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26595
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://lore.kernel.org/linux-cve-announce/2024022336-CVE-2024-26595-9a8d@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2024-26595
https://www.cve.org/CVERecord?id=CVE-2024-26595
|
| kernel-headers |
CVE-2024-26602 |
MEDIUM |
3.10.0-1160.108.1.el7 |
3.10.0-1160.114.2.el7 |
https://access.redhat.com/security/cve/CVE-2024-26602
https://git.kernel.org/stable/c/2441a64070b85c14eecc3728cc87e883f953f265
https://git.kernel.org/stable/c/24ec7504a08a67247fbe798d1de995208a8c128a
https://git.kernel.org/stable/c/3cd139875e9a7688b3fc715264032620812a5fa3
https://git.kernel.org/stable/c/50fb4e17df319bb33be6f14e2a856950c1577dee
https://git.kernel.org/stable/c/944d5fe50f3f03daacfea16300e656a1691c4a23
https://git.kernel.org/stable/c/b6a2a9cbb67545c825ec95f06adb7ff300a2ad71
https://git.kernel.org/stable/c/c5b2063c65d05e79fad8029324581d86cfba7eea
https://git.kernel.org/stable/c/db896bbe4a9c67cee377e5f6a743350d3ae4acf6
https://github.com/torvalds/linux/commit/944d5fe50f3f03daacfea16300e656a1691c4a23
https://lore.kernel.org/linux-cve-announce/2024022414-CVE-2024-26602-5e76@gregkh/
https://nvd.nist.gov/vuln/detail/CVE-2024-26602
https://www.cve.org/CVERecord?id=CVE-2024-26602
|
| kernel-headers |
CVE-2024-26604 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26604
https://git.kernel.org/stable/c/3ca8fbabcceb8bfe44f7f50640092fd8f1de375c
https://git.kernel.org/stable/c/7f414d306320f837cc3df96cf52161cb8290fb1b
https://git.kernel.org/stable/c/b746d52ce7bcac325a2fa264216ead85b7fbbfaa
https://nvd.nist.gov/vuln/detail/CVE-2024-26604
https://www.cve.org/CVERecord?id=CVE-2024-26604
|
| kernel-headers |
CVE-2024-26608 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26608
https://git.kernel.org/stable/c/2c939c74ef0b74e99b92e32edc2a59f9b9ca3d5a
https://git.kernel.org/stable/c/6993328a4cd62a24df254b587c0796a4a1eecc95
https://git.kernel.org/stable/c/9863a53100f47652755545c2bd43e14a1855104d
https://git.kernel.org/stable/c/aaa1f1a2ee80888c12ae2783f3a0be10e14067c5
https://git.kernel.org/stable/c/ebeae8adf89d9a82359f6659b1663d09beec2faa
https://nvd.nist.gov/vuln/detail/CVE-2024-26608
https://www.cve.org/CVERecord?id=CVE-2024-26608
|
| kernel-headers |
CVE-2024-26609 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26609
https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-41-lee@kernel.org/T
https://nvd.nist.gov/vuln/detail/CVE-2024-26609
https://www.cve.org/CVERecord?id=CVE-2024-26609
|
| kernel-headers |
CVE-2024-26610 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26610
https://git.kernel.org/stable/c/05dd9facfb9a1e056752c0901c6e86416037d15a
https://git.kernel.org/stable/c/870171899d75d43e3d14360f3a4850e90a9c289b
https://git.kernel.org/stable/c/99a23462fe1a6f709f0fda3ebbe8b6b193ac75bd
https://git.kernel.org/stable/c/aa2cc9363926991ba74411e3aa0a0ea82c1ffe32
https://git.kernel.org/stable/c/cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d
https://git.kernel.org/stable/c/f32a81999d0b8e5ce60afb5f6a3dd7241c17dd67
https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-42-lee@kernel.org/T
https://nvd.nist.gov/vuln/detail/CVE-2024-26610
https://www.cve.org/CVERecord?id=CVE-2024-26610
|
| kernel-headers |
CVE-2024-26612 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26612
https://git.kernel.org/stable/c/1c45256e599061021e2c848952e50f406457e448
https://git.kernel.org/stable/c/3be0b3ed1d76c6703b9ee482b55f7e01c369cc68
https://git.kernel.org/stable/c/4200ad3e46ce50f410fdda302745489441bc70f0
https://git.kernel.org/stable/c/82a9bc343ba019665d3ddc1d9a180bf0e0390cf3
https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-44-lee@kernel.org/T
https://nvd.nist.gov/vuln/detail/CVE-2024-26612
https://www.cve.org/CVERecord?id=CVE-2024-26612
|
| kernel-headers |
CVE-2024-26614 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26614
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://nvd.nist.gov/vuln/detail/CVE-2024-26614
https://www.cve.org/CVERecord?id=CVE-2024-26614
|
| kernel-headers |
CVE-2024-26616 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26616
https://git.kernel.org/stable/c/34de0f04684ec00c093a0455648be055f0e8e24f
https://git.kernel.org/stable/c/642b9c520ef2f104277ad1f902f8526edbe087fb
https://git.kernel.org/stable/c/f546c4282673497a06ecb6190b50ae7f6c85b02f
https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-48-lee@kernel.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2024-26616
https://www.cve.org/CVERecord?id=CVE-2024-26616
|
| kernel-headers |
CVE-2024-26621 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26621
https://git.kernel.org/stable/c/4ef9ad19e17676b9ef071309bc62020e2373705d
https://git.kernel.org/stable/c/7432376c913381c5f24d373a87ff629bbde94b47
https://git.kernel.org/stable/c/87632bc9ecff5ded93433bc0fca428019bdd1cfe
https://lore.kernel.org/linux-cve-announce/2024030255-CVE-2024-26621-9300@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2024-26621
https://www.cve.org/CVERecord?id=CVE-2024-26621
|
| kernel-headers |
CVE-2024-26624 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26624
https://git.kernel.org/linus/4d322dce82a1d44f8c83f0f54f95dd1b8dcf46c9 (6.8-rc3)
https://git.kernel.org/stable/c/4d322dce82a1d44f8c83f0f54f95dd1b8dcf46c9
https://git.kernel.org/stable/c/5e7f3e0381c002cb2abde42f09ad511991a8ebaf
https://git.kernel.org/stable/c/875f31aaa67e306098befa5e798a049075910fa7
https://git.kernel.org/stable/c/a2104f43876408b164be5fd58f9b6a3a73b77746
https://git.kernel.org/stable/c/b169ffde733c5adf01788ae091c377f0eca44806
https://git.kernel.org/stable/c/c2d272a9a1e8f22ba584589219f6fe1886a3595f
https://git.kernel.org/stable/c/c8f6b3b864cb876e9ee21666a391c9ee290682ac
https://git.kernel.org/stable/c/f199018dc762dfa501f6d96a424468a0f3c10d9e
https://lore.kernel.org/linux-cve-announce/2024030648-CVE-2024-26624-3032@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2024-26624
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2024-26624
|
| kernel-headers |
CVE-2024-26625 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26625
https://git.kernel.org/linus/aa2b2eb3934859904c287bf5434647ba72e14c1c (6.8-rc3)
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://lore.kernel.org/linux-cve-announce/2024030648-CVE-2024-26625-3549@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2024-26625
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2024-26625
|
| kernel-headers |
CVE-2024-26626 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26626
https://git.kernel.org/stable/c/2e8c9ae40adda2be1ba41c05fd3cd1e61cce3207
https://git.kernel.org/stable/c/d2f1b7fe74afd66298dbb3c7b39e7b62e4df1724
https://git.kernel.org/stable/c/dcaafdba6c6162bb49f1192850bc3bbc3707738c
https://git.kernel.org/stable/c/e622502c310f1069fd9f41cd38210553115f610a
https://lore.kernel.org/linux-cve-announce/2024030648-CVE-2024-26626-a910@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2024-26626
https://www.cve.org/CVERecord?id=CVE-2024-26626
|
| kernel-headers |
CVE-2024-26627 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26627
https://git.kernel.org/linus/4373534a9850627a2695317944898eb1283a2db0 (6.8-rc3)
https://git.kernel.org/stable/c/07e3ca0f17f579491b5f54e9ed05173d6c1d6fcb
https://git.kernel.org/stable/c/4373534a9850627a2695317944898eb1283a2db0
https://git.kernel.org/stable/c/65ead8468c21c2676d4d06f50b46beffdea69df1
https://git.kernel.org/stable/c/d37c1c81419fdef66ebd0747cf76fb8b7d979059
https://git.kernel.org/stable/c/db6338f45971b4285ea368432a84033690eaf53c
https://git.kernel.org/stable/c/f5944853f7a961fedc1227dc8f60393f8936d37c
https://lore.kernel.org/linux-cve-announce/2024030648-CVE-2024-26627-e3a2@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2024-26627
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2024-26627
|
| kernel-headers |
CVE-2024-26629 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26629
https://git.kernel.org/stable/c/8f5b860de87039b007e84a28a5eefc888154e098
https://git.kernel.org/stable/c/b7d2eee1f53899b53f069bba3a59a419fc3d331b
https://git.kernel.org/stable/c/e4cf8941664cae2f89f0189c29fe2ce8c6be0d03
https://git.kernel.org/stable/c/edcf9725150e42beeca42d085149f4c88fa97afd
https://lore.kernel.org/linux-cve-announce/20240313140155.1913910-4-lee@kernel.org/T
https://nvd.nist.gov/vuln/detail/CVE-2024-26629
https://www.cve.org/CVERecord?id=CVE-2024-26629
|
| kernel-headers |
CVE-2024-26630 |
MEDIUM |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26630
https://git.kernel.org/stable/c/3a75cb05d53f4a6823a32deb078de1366954a804
https://git.kernel.org/stable/c/ba60fdf75e89ea762bb617be578dc47f27655117
https://git.kernel.org/stable/c/fe7e008e0ce728252e4ec652cceebcc62211657c
https://lore.kernel.org/linux-cve-announce/20240313155037.1968072-2-lee@kernel.org/T
https://nvd.nist.gov/vuln/detail/CVE-2024-26630
https://www.cve.org/CVERecord?id=CVE-2024-26630
|
| kernel-headers |
CVE-2014-0131 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1fd819ecb90cc9b822cd84d3056ddba315d3340f
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1fd819ecb90cc9b822cd84d3056ddba315d3340f
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
http://www.openwall.com/lists/oss-security/2014/03/10/4
http://www.spinics.net/lists/netdev/msg274250.html
http://www.spinics.net/lists/netdev/msg274316.html
https://access.redhat.com/security/cve/CVE-2014-0131
https://bugzilla.redhat.com/show_bug.cgi?id=1074589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0131
https://github.com/torvalds/linux/commit/1fd819ecb90cc9b822cd84d3056ddba315d3340f
https://nvd.nist.gov/vuln/detail/CVE-2014-0131
https://ubuntu.com/security/notices/USN-2283-1
https://ubuntu.com/security/notices/USN-2284-1
https://ubuntu.com/security/notices/USN-2285-1
https://ubuntu.com/security/notices/USN-2286-1
https://ubuntu.com/security/notices/USN-2287-1
https://ubuntu.com/security/notices/USN-2289-1
https://www.cve.org/CVERecord?id=CVE-2014-0131
|
| kernel-headers |
CVE-2014-2038 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=263b4509ec4d47e0da3e753f85a39ea12d1eff24
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.3
http://www.openwall.com/lists/oss-security/2014/02/20/16
http://www.ubuntu.com/usn/USN-2137-1
http://www.ubuntu.com/usn/USN-2140-1
https://access.redhat.com/security/cve/CVE-2014-2038
https://bugzilla.redhat.com/show_bug.cgi?id=1066939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2038
https://git.kernel.org/linus/263b4509ec4d47e0da3e753f85a39ea12d1eff24
https://github.com/torvalds/linux/commit/263b4509ec4d47e0da3e753f85a39ea12d1eff24
https://nvd.nist.gov/vuln/detail/CVE-2014-2038
https://ubuntu.com/security/notices/USN-2137-1
https://ubuntu.com/security/notices/USN-2140-1
https://www.cve.org/CVERecord?id=CVE-2014-2038
|
| kernel-headers |
CVE-2014-8181 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2014-8181
https://bugzilla.redhat.com/show_bug.cgi?id=1335817
https://nvd.nist.gov/vuln/detail/CVE-2014-8181
https://www.cve.org/CVERecord?id=CVE-2014-8181
|
| kernel-headers |
CVE-2014-9731 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
http://www.openwall.com/lists/oss-security/2015/06/03/4
http://www.securityfocus.com/bid/75001
https://access.redhat.com/security/cve/CVE-2014-9731
https://bugzilla.redhat.com/show_bug.cgi?id=1228220
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9731
https://github.com/torvalds/linux/commit/0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
https://nvd.nist.gov/vuln/detail/CVE-2014-9731
https://source.android.com/security/bulletin/2017-07-01
https://ubuntu.com/security/notices/USN-2517-1
https://ubuntu.com/security/notices/USN-2518-1
https://ubuntu.com/security/notices/USN-2541-1
https://ubuntu.com/security/notices/USN-2542-1
https://ubuntu.com/security/notices/USN-2543-1
https://ubuntu.com/security/notices/USN-2544-1
https://www.cve.org/CVERecord?id=CVE-2014-9731
|
| kernel-headers |
CVE-2015-1142857 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://seclists.org/oss-sec/2015/q4/425
https://access.redhat.com/security/cve/CVE-2015-1142857
https://nvd.nist.gov/vuln/detail/CVE-2015-1142857
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00046&languageid=en-fr
https://www.cve.org/CVERecord?id=CVE-2015-1142857
https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-smolyar.pdf
|
| kernel-headers |
CVE-2015-1350 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://marc.info/?l=linux-kernel&m=142153722930533&w=2
http://www.openwall.com/lists/oss-security/2015/01/24/5
http://www.securityfocus.com/bid/76075
https://access.redhat.com/security/cve/CVE-2015-1350
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770492
https://bugzilla.redhat.com/show_bug.cgi?id=1185139
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1350
https://linux.oracle.com/cve/CVE-2015-1350.html
https://linux.oracle.com/errata/ELSA-2022-9969.html
https://nvd.nist.gov/vuln/detail/CVE-2015-1350
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-4904-1
https://www.cve.org/CVERecord?id=CVE-2015-1350
|
| kernel-headers |
CVE-2015-1420 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html
http://marc.info/?l=linux-kernel&m=142247707318982&w=2
http://www.debian.org/security/2015/dsa-3170
http://www.openwall.com/lists/oss-security/2015/01/29/12
http://www.securityfocus.com/bid/72357
http://www.ubuntu.com/usn/USN-2660-1
http://www.ubuntu.com/usn/USN-2661-1
http://www.ubuntu.com/usn/USN-2665-1
http://www.ubuntu.com/usn/USN-2667-1
https://access.redhat.com/security/cve/CVE-2015-1420
https://bugzilla.redhat.com/show_bug.cgi?id=1187534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1420
https://linux.oracle.com/cve/CVE-2015-1420.html
https://linux.oracle.com/errata/ELSA-2017-3516.html
https://nvd.nist.gov/vuln/detail/CVE-2015-1420
https://ubuntu.com/security/notices/USN-2660-1
https://ubuntu.com/security/notices/USN-2661-1
https://ubuntu.com/security/notices/USN-2662-1
https://ubuntu.com/security/notices/USN-2663-1
https://ubuntu.com/security/notices/USN-2664-1
https://ubuntu.com/security/notices/USN-2665-1
https://ubuntu.com/security/notices/USN-2666-1
https://ubuntu.com/security/notices/USN-2667-1
https://www.cve.org/CVERecord?id=CVE-2015-1420
|
| kernel-headers |
CVE-2015-2877 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.antoniobarresi.com/files/cain_advisory.txt
http://www.kb.cert.org/vuls/id/935424
http://www.securityfocus.com/bid/76256
https://access.redhat.com/security/cve/CVE-2015-2877
https://bugzilla.redhat.com/show_bug.cgi?id=1252096
https://nvd.nist.gov/vuln/detail/CVE-2015-2877
https://www.cve.org/CVERecord?id=CVE-2015-2877
https://www.kb.cert.org/vuls/id/BGAR-A2CNKG
https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH
https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
|
| kernel-headers |
CVE-2015-3291 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=810bc075f78ff2c221536eb3008eac6a492dba2d
http://www.debian.org/security/2015/dsa-3313
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6
http://www.openwall.com/lists/oss-security/2015/07/22/7
http://www.securityfocus.com/bid/76003
http://www.ubuntu.com/usn/USN-2687-1
http://www.ubuntu.com/usn/USN-2688-1
http://www.ubuntu.com/usn/USN-2689-1
http://www.ubuntu.com/usn/USN-2690-1
http://www.ubuntu.com/usn/USN-2691-1
https://access.redhat.com/security/cve/CVE-2015-3291
https://bugzilla.redhat.com/show_bug.cgi?id=1243489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3291
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=810bc075f78ff2c221536eb3008eac6a492dba2d
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a27507ca2d796cfa8d907de31ad730359c8a6d06 (prerequisite)
https://github.com/torvalds/linux/commit/810bc075f78ff2c221536eb3008eac6a492dba2d
https://nvd.nist.gov/vuln/detail/CVE-2015-3291
https://security-tracker.debian.org/tracker/CVE-2015-3291
https://ubuntu.com/security/notices/USN-2687-1
https://ubuntu.com/security/notices/USN-2688-1
https://ubuntu.com/security/notices/USN-2689-1
https://ubuntu.com/security/notices/USN-2690-1
https://ubuntu.com/security/notices/USN-2691-1
https://ubuntu.com/security/notices/USN-2700-1
https://ubuntu.com/security/notices/USN-2701-1
https://www.cve.org/CVERecord?id=CVE-2015-3291
|
| kernel-headers |
CVE-2015-5257 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbb4be652d374f64661137756b8f357a1827d6a4
http://www.debian.org/security/2015/dsa-3372
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.4
http://www.openwall.com/lists/oss-security/2015/09/23/1
http://www.securityfocus.com/bid/76834
http://www.ubuntu.com/usn/USN-2792-1
http://www.ubuntu.com/usn/USN-2794-1
http://www.ubuntu.com/usn/USN-2795-1
http://www.ubuntu.com/usn/USN-2798-1
http://www.ubuntu.com/usn/USN-2799-1
https://access.redhat.com/security/cve/CVE-2015-5257
https://bugzilla.redhat.com/show_bug.cgi?id=1265607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5257
https://github.com/torvalds/linux/commit/cbb4be652d374f64661137756b8f357a1827d6a4
https://linux.oracle.com/cve/CVE-2015-5257.html
https://linux.oracle.com/errata/ELSA-2017-3567.html
https://marc.info/?l=linux-usb&m=144303376328355
https://nvd.nist.gov/vuln/detail/CVE-2015-5257
https://ubuntu.com/security/notices/USN-2792-1
https://ubuntu.com/security/notices/USN-2794-1
https://ubuntu.com/security/notices/USN-2795-1
https://ubuntu.com/security/notices/USN-2796-1
https://ubuntu.com/security/notices/USN-2797-1
https://ubuntu.com/security/notices/USN-2798-1
https://ubuntu.com/security/notices/USN-2799-1
https://www.cve.org/CVERecord?id=CVE-2015-5257
|
| kernel-headers |
CVE-2015-5275 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2015-5275
https://nvd.nist.gov/vuln/detail/CVE-2015-5275
https://www.cve.org/CVERecord?id=CVE-2015-5275
|
| kernel-headers |
CVE-2015-5697 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
http://www.debian.org/security/2015/dsa-3329
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6
http://www.openwall.com/lists/oss-security/2015/07/28/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
http://www.securityfocus.com/bid/76066
http://www.securitytracker.com/id/1033211
http://www.ubuntu.com/usn/USN-2731-1
http://www.ubuntu.com/usn/USN-2732-1
http://www.ubuntu.com/usn/USN-2748-1
http://www.ubuntu.com/usn/USN-2749-1
http://www.ubuntu.com/usn/USN-2751-1
http://www.ubuntu.com/usn/USN-2752-1
http://www.ubuntu.com/usn/USN-2777-1
https://access.redhat.com/security/cve/CVE-2015-5697
https://bugzilla.redhat.com/show_bug.cgi?id=1249011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5697
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=77ba0569d4c8389c0a2162ab0c7c16a6f3b199e4
https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16
https://linux.oracle.com/cve/CVE-2015-5697.html
https://linux.oracle.com/errata/ELSA-2015-3068.html
https://nvd.nist.gov/vuln/detail/CVE-2015-5697
https://ubuntu.com/security/notices/USN-2731-1
https://ubuntu.com/security/notices/USN-2732-1
https://ubuntu.com/security/notices/USN-2748-1
https://ubuntu.com/security/notices/USN-2749-1
https://ubuntu.com/security/notices/USN-2751-1
https://ubuntu.com/security/notices/USN-2752-1
https://ubuntu.com/security/notices/USN-2777-1
https://www.cve.org/CVERecord?id=CVE-2015-5697
|
| kernel-headers |
CVE-2015-6252 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2015/dsa-3364
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.5
http://www.openwall.com/lists/oss-security/2015/08/18/3
http://www.securityfocus.com/bid/76400
http://www.securitytracker.com/id/1033666
http://www.ubuntu.com/usn/USN-2748-1
http://www.ubuntu.com/usn/USN-2749-1
http://www.ubuntu.com/usn/USN-2751-1
http://www.ubuntu.com/usn/USN-2752-1
http://www.ubuntu.com/usn/USN-2759-1
http://www.ubuntu.com/usn/USN-2760-1
http://www.ubuntu.com/usn/USN-2777-1
https://access.redhat.com/security/cve/CVE-2015-6252
https://bugzilla.redhat.com/show_bug.cgi?id=1251839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6252
https://github.com/torvalds/linux/commit/7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5
https://linux.oracle.com/cve/CVE-2015-6252.html
https://linux.oracle.com/errata/ELSA-2017-3567.html
https://lkml.org/lkml/2015/8/10/375
https://nvd.nist.gov/vuln/detail/CVE-2015-6252
https://ubuntu.com/security/notices/USN-2748-1
https://ubuntu.com/security/notices/USN-2749-1
https://ubuntu.com/security/notices/USN-2751-1
https://ubuntu.com/security/notices/USN-2752-1
https://ubuntu.com/security/notices/USN-2759-1
https://ubuntu.com/security/notices/USN-2760-1
https://ubuntu.com/security/notices/USN-2777-1
https://www.cve.org/CVERecord?id=CVE-2015-6252
|
| kernel-headers |
CVE-2015-7515 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e20cf2bce122ce9262d6034ee5d5b76fbb92f96
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3607
http://www.securityfocus.com/bid/84288
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
https://access.redhat.com/security/cve/CVE-2015-7515
https://bugzilla.redhat.com/show_bug.cgi?id=1285326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7515
https://github.com/torvalds/linux/commit/8e20cf2bce122ce9262d6034ee5d5b76fbb92f96
https://nvd.nist.gov/vuln/detail/CVE-2015-7515
https://os-s.net/advisories/OSS-2016-05_aiptek.pdf
https://security-tracker.debian.org/tracker/CVE-2015-7515
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://www.cve.org/CVERecord?id=CVE-2015-7515
https://www.exploit-db.com/exploits/39544/
|
| kernel-headers |
CVE-2015-7566 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb3232138e37129e88240a98a1d2aba2187ff57c
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://marc.info/?l=linux-usb&m=145260786729359&w=2
http://www.debian.org/security/2016/dsa-3448
http://www.debian.org/security/2016/dsa-3503
http://www.securityfocus.com/archive/1/537733/100/0/threaded
http://www.securityfocus.com/bid/82975
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2015-7566
https://bugzilla.redhat.com/show_bug.cgi?id=1283371
https://bugzilla.redhat.com/show_bug.cgi?id=1296466
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7566
https://github.com/torvalds/linux/commit/cb3232138e37129e88240a98a1d2aba2187ff57c
https://nvd.nist.gov/vuln/detail/CVE-2015-7566
https://security-tracker.debian.org/tracker/CVE-2015-7566
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://www.cve.org/CVERecord?id=CVE-2015-7566
https://www.exploit-db.com/exploits/39540/
|
| kernel-headers |
CVE-2015-7799 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
http://www.debian.org/security/2015/dsa-3426
http://www.openwall.com/lists/oss-security/2015/10/09/1
http://www.openwall.com/lists/oss-security/2015/10/10/3
http://www.securityfocus.com/bid/77033
http://www.securitytracker.com/id/1033809
http://www.ubuntu.com/usn/USN-2841-1
http://www.ubuntu.com/usn/USN-2841-2
http://www.ubuntu.com/usn/USN-2842-1
http://www.ubuntu.com/usn/USN-2842-2
http://www.ubuntu.com/usn/USN-2843-1
http://www.ubuntu.com/usn/USN-2843-2
http://www.ubuntu.com/usn/USN-2843-3
http://www.ubuntu.com/usn/USN-2844-1
http://www.ubuntu.com/usn/USN-2886-1
https://access.redhat.com/security/cve/CVE-2015-7799
https://bugzilla.redhat.com/show_bug.cgi?id=1271134
https://code.google.com/p/android/issues/detail?id=187973
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799
https://nvd.nist.gov/vuln/detail/CVE-2015-7799
https://ubuntu.com/security/notices/USN-2841-1
https://ubuntu.com/security/notices/USN-2841-2
https://ubuntu.com/security/notices/USN-2842-1
https://ubuntu.com/security/notices/USN-2842-2
https://ubuntu.com/security/notices/USN-2843-1
https://ubuntu.com/security/notices/USN-2843-2
https://ubuntu.com/security/notices/USN-2843-3
https://ubuntu.com/security/notices/USN-2844-1
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://www.cve.org/CVERecord?id=CVE-2015-7799
|
| kernel-headers |
CVE-2015-7833 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
http://seclists.org/bugtraq/2015/Oct/35
http://www.debian.org/security/2015/dsa-3396
http://www.debian.org/security/2015/dsa-3426
http://www.os-s.net/advisories/DOS-KernelCrashesOnInvalidUSBDeviceDescriptors-UsbvisionDriver.pdf
http://www.securityfocus.com/archive/1/536629
http://www.securityfocus.com/bid/77030
http://www.securitytracker.com/id/1034452
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2947-1
http://www.ubuntu.com/usn/USN-2947-2
http://www.ubuntu.com/usn/USN-2947-3
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2015-7833
https://bugzilla.redhat.com/show_bug.cgi?id=1201858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833
https://nvd.nist.gov/vuln/detail/CVE-2015-7833
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2947-1
https://ubuntu.com/security/notices/USN-2947-2
https://ubuntu.com/security/notices/USN-2947-3
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://www.cve.org/CVERecord?id=CVE-2015-7833
|
| kernel-headers |
CVE-2015-8569 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ccfd238e5a0e670d8178cf50180ea81ae09ae1
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://twitter.com/grsecurity/statuses/676744240802750464
http://www.debian.org/security/2016/dsa-3434
http://www.openwall.com/lists/oss-security/2015/12/15/11
http://www.openwall.com/lists/oss-security/2015/12/15/7
http://www.securityfocus.com/bid/79428
http://www.securitytracker.com/id/1034549
http://www.ubuntu.com/usn/USN-2886-1
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
https://access.redhat.com/security/cve/CVE-2015-8569
https://bugzilla.redhat.com/show_bug.cgi?id=1292045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569
https://github.com/torvalds/linux/commit/09ccfd238e5a0e670d8178cf50180ea81ae09ae1
https://linux.oracle.com/cve/CVE-2015-8569.html
https://linux.oracle.com/errata/ELSA-2017-3534.html
https://lkml.org/lkml/2015/12/14/252
https://nvd.nist.gov/vuln/detail/CVE-2015-8569
https://twitter.com/grsecurity/status/676744240802750464
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
https://ubuntu.com/security/notices/USN-2907-1
https://ubuntu.com/security/notices/USN-2907-2
https://ubuntu.com/security/notices/USN-2910-1
https://www.cve.org/CVERecord?id=CVE-2015-8569
|
| kernel-headers |
CVE-2015-8575 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5233252fce714053f0151680933571a2da9cbfb4
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3434
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4
http://www.openwall.com/lists/oss-security/2015/12/16/3
http://www.securityfocus.com/bid/79724
http://www.ubuntu.com/usn/USN-2886-1
http://www.ubuntu.com/usn/USN-2888-1
http://www.ubuntu.com/usn/USN-2890-1
http://www.ubuntu.com/usn/USN-2890-2
http://www.ubuntu.com/usn/USN-2890-3
https://access.redhat.com/security/cve/CVE-2015-8575
https://bugzilla.redhat.com/show_bug.cgi?id=1292840
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5233252fce714053f0151680933571a2da9cbfb4
https://github.com/torvalds/linux/commit/5233252fce714053f0151680933571a2da9cbfb4
https://linux.oracle.com/cve/CVE-2015-8575.html
https://linux.oracle.com/errata/ELSA-2018-4172.html
https://nvd.nist.gov/vuln/detail/CVE-2015-8575
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2888-1
https://ubuntu.com/security/notices/USN-2890-1
https://ubuntu.com/security/notices/USN-2890-2
https://ubuntu.com/security/notices/USN-2890-3
https://ubuntu.com/security/notices/USN-2907-1
https://ubuntu.com/security/notices/USN-2907-2
https://ubuntu.com/security/notices/USN-2910-1
https://www.cve.org/CVERecord?id=CVE-2015-8575
|
| kernel-headers |
CVE-2015-8785 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ca8138f014a913f98e6ef40e939868e1e9ea876
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.openwall.com/lists/oss-security/2016/01/24/1
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/81688
http://www.ubuntu.com/usn/USN-2886-1
https://access.redhat.com/security/cve/CVE-2015-8785
https://bugzilla.redhat.com/show_bug.cgi?id=1290642
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785
https://github.com/torvalds/linux/commit/3ca8138f014a913f98e6ef40e939868e1e9ea876
https://linux.oracle.com/cve/CVE-2015-8785.html
https://linux.oracle.com/errata/ELSA-2016-3596.html
https://nvd.nist.gov/vuln/detail/CVE-2015-8785
https://ubuntu.com/security/notices/USN-2886-1
https://ubuntu.com/security/notices/USN-2886-2
https://ubuntu.com/security/notices/USN-2907-1
https://ubuntu.com/security/notices/USN-2907-2
https://ubuntu.com/security/notices/USN-2908-1
https://ubuntu.com/security/notices/USN-2908-2
https://ubuntu.com/security/notices/USN-2908-3
https://ubuntu.com/security/notices/USN-2909-1
https://ubuntu.com/security/notices/USN-2910-1
https://www.cve.org/CVERecord?id=CVE-2015-8785
|
| kernel-headers |
CVE-2015-8816 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e50293ef9775c5f1cf3fcc093037dd6a8c5684ea
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://source.android.com/security/bulletin/2016-07-01.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.5
http://www.openwall.com/lists/oss-security/2016/02/23/5
http://www.openwall.com/lists/oss-security/2016/02/24/3
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/83363
http://www.spinics.net/lists/linux-usb/msg132311.html
https://access.redhat.com/security/cve/CVE-2015-8816
https://bugzilla.redhat.com/show_bug.cgi?id=1311589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816
https://github.com/torvalds/linux/commit/e50293ef9775c5f1cf3fcc093037dd6a8c5684ea
https://linux.oracle.com/cve/CVE-2015-8816.html
https://linux.oracle.com/errata/ELSA-2016-3596.html
https://nvd.nist.gov/vuln/detail/CVE-2015-8816
https://www.cve.org/CVERecord?id=CVE-2015-8816
|
| kernel-headers |
CVE-2015-8964 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc
http://source.android.com/security/bulletin/2016-11-01.html
http://www.securityfocus.com/bid/94138
https://access.redhat.com/security/cve/CVE-2015-8964
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8964
https://github.com/torvalds/linux/commit/dd42bf1197144ede075a9d4793123f7689e164bc
https://nvd.nist.gov/vuln/detail/CVE-2015-8964
https://ubuntu.com/security/notices/USN-3161-1
https://ubuntu.com/security/notices/USN-3161-2
https://ubuntu.com/security/notices/USN-3161-3
https://ubuntu.com/security/notices/USN-3161-4
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://www.cve.org/CVERecord?id=CVE-2015-8964
|
| kernel-headers |
CVE-2016-0823 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce
http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
http://source.android.com/security/bulletin/2016-03-01.html
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.3
http://www.securityfocus.com/bid/84265
https://access.redhat.com/security/cve/CVE-2016-0823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0823
https://github.com/torvalds/linux/commit/ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce
https://googleprojectzero.blogspot.cz/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
https://nvd.nist.gov/vuln/detail/CVE-2016-0823
https://www.cve.org/CVERecord?id=CVE-2016-0823
|
| kernel-headers |
CVE-2016-2184 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f886ca12765d20124bd06291c82951fd49a33be
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/102
http://seclists.org/bugtraq/2016/Mar/88
http://seclists.org/bugtraq/2016/Mar/89
http://www.debian.org/security/2016/dsa-3607
http://www.securityfocus.com/bid/84340
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-2184
https://bugzilla.redhat.com/show_bug.cgi?id=1317012
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184
https://github.com/torvalds/linux/commit/0f886ca12765d20124bd06291c82951fd49a33be
https://nvd.nist.gov/vuln/detail/CVE-2016-2184
https://source.android.com/security/bulletin/2016-11-01.html
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://www.cve.org/CVERecord?id=CVE-2016-2184
https://www.exploit-db.com/exploits/39555/
https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
|
| kernel-headers |
CVE-2016-2185 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/116
http://seclists.org/bugtraq/2016/Mar/90
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.securityfocus.com/bid/84341
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-2185
https://bugzilla.redhat.com/show_bug.cgi?id=1283362
https://bugzilla.redhat.com/show_bug.cgi?id=1283363
https://bugzilla.redhat.com/show_bug.cgi?id=1317014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185
https://github.com/torvalds/linux/commit/950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d
https://nvd.nist.gov/vuln/detail/CVE-2016-2185
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://www.cve.org/CVERecord?id=CVE-2016-2185
|
| kernel-headers |
CVE-2016-2186 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9c6ba456711687b794dcf285856fc14e2c76074f
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://marc.info/?l=linux-usb&m=145796479528669&w=2
http://seclists.org/bugtraq/2016/Mar/117
http://seclists.org/bugtraq/2016/Mar/85
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.securityfocus.com/bid/84337
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-2186
https://bugzilla.redhat.com/show_bug.cgi?id=1317015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186
https://github.com/torvalds/linux/commit/9c6ba456711687b794dcf285856fc14e2c76074f
https://nvd.nist.gov/vuln/detail/CVE-2016-2186
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://www.cve.org/CVERecord?id=CVE-2016-2186
|
| kernel-headers |
CVE-2016-2187 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=162f98dea487206d9ab79fc12ed64700667a894d
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://www.debian.org/security/2016/dsa-3607
http://www.securityfocus.com/bid/85425
http://www.ubuntu.com/usn/USN-2989-1
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-2998-1
http://www.ubuntu.com/usn/USN-3000-1
http://www.ubuntu.com/usn/USN-3001-1
http://www.ubuntu.com/usn/USN-3002-1
http://www.ubuntu.com/usn/USN-3003-1
http://www.ubuntu.com/usn/USN-3004-1
http://www.ubuntu.com/usn/USN-3005-1
http://www.ubuntu.com/usn/USN-3006-1
http://www.ubuntu.com/usn/USN-3007-1
https://access.redhat.com/security/cve/CVE-2016-2187
https://bugzilla.redhat.com/show_bug.cgi?id=1317017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2187
https://github.com/torvalds/linux/commit/162f98dea487206d9ab79fc12ed64700667a894d
https://nvd.nist.gov/vuln/detail/CVE-2016-2187
https://ubuntu.com/security/notices/USN-2989-1
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-2998-1
https://ubuntu.com/security/notices/USN-3000-1
https://ubuntu.com/security/notices/USN-3001-1
https://ubuntu.com/security/notices/USN-3002-1
https://ubuntu.com/security/notices/USN-3003-1
https://ubuntu.com/security/notices/USN-3004-1
https://ubuntu.com/security/notices/USN-3005-1
https://ubuntu.com/security/notices/USN-3006-1
https://ubuntu.com/security/notices/USN-3007-1
https://www.cve.org/CVERecord?id=CVE-2016-2187
|
| kernel-headers |
CVE-2016-2188 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4ec0ef3a82125efc36173062a50624550a900ae0
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://marc.info/?l=linux-usb&m=145796659429788&w=2
http://seclists.org/bugtraq/2016/Mar/118
http://seclists.org/bugtraq/2016/Mar/87
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-2188
https://bugzilla.redhat.com/show_bug.cgi?id=1317018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2188
https://github.com/torvalds/linux/commit/4ec0ef3a82125efc36173062a50624550a900ae0
https://nvd.nist.gov/vuln/detail/CVE-2016-2188
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://www.cve.org/CVERecord?id=CVE-2016-2188
https://www.exploit-db.com/exploits/39556/
|
| kernel-headers |
CVE-2016-2543 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=030e2c78d3a91dd0d27fef37e91950dde333eba1
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83377
http://www.securitytracker.com/id/1035304
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2543
https://bugzilla.redhat.com/show_bug.cgi?id=1311554
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543
https://github.com/torvalds/linux/commit/030e2c78d3a91dd0d27fef37e91950dde333eba1
https://linux.oracle.com/cve/CVE-2016-2543.html
https://linux.oracle.com/errata/ELSA-2018-4145.html
https://lkml.org/lkml/2016/1/12/215
https://nvd.nist.gov/vuln/detail/CVE-2016-2543
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://www.cve.org/CVERecord?id=CVE-2016-2543
|
| kernel-headers |
CVE-2016-2544 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3567eb6af614dac436c4b16a8d426f9faed639b3
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83380
http://www.securitytracker.com/id/1035305
http://www.spinics.net/lists/alsa-devel/msg45102.html
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2544
https://bugzilla.redhat.com/show_bug.cgi?id=1311558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544
https://github.com/torvalds/linux/commit/3567eb6af614dac436c4b16a8d426f9faed639b3
https://linux.oracle.com/cve/CVE-2016-2544.html
https://linux.oracle.com/errata/ELSA-2018-4145.html
https://lkml.org/lkml/2016/1/12/465
https://nvd.nist.gov/vuln/detail/CVE-2016-2544
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://www.cve.org/CVERecord?id=CVE-2016-2544
|
| kernel-headers |
CVE-2016-2545 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee8413b01045c74340aa13ad5bdf905de32be736
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83381
http://www.securitytracker.com/id/1035296
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2545
https://bugzilla.redhat.com/show_bug.cgi?id=1311560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545
https://github.com/torvalds/linux/commit/ee8413b01045c74340aa13ad5bdf905de32be736
https://linux.oracle.com/cve/CVE-2016-2545.html
https://linux.oracle.com/errata/ELSA-2018-4145.html
https://nvd.nist.gov/vuln/detail/CVE-2016-2545
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://www.cve.org/CVERecord?id=CVE-2016-2545
|
| kernel-headers |
CVE-2016-2549 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2ba1fe7a06d3624f9a7586d672b55f08f7c670f3
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.debian.org/security/2016/dsa-3503
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1
http://www.openwall.com/lists/oss-security/2016/01/19/1
http://www.openwall.com/lists/oss-security/2016/02/23/11
http://www.securityfocus.com/bid/83382
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2931-1
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2549
https://bugzilla.redhat.com/show_bug.cgi?id=1311570
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549
https://github.com/torvalds/linux/commit/2ba1fe7a06d3624f9a7586d672b55f08f7c670f3
https://linux.oracle.com/cve/CVE-2016-2549.html
https://linux.oracle.com/errata/ELSA-2018-4145.html
https://nvd.nist.gov/vuln/detail/CVE-2016-2549
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2931-1
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://www.cve.org/CVERecord?id=CVE-2016-2549
|
| kernel-headers |
CVE-2016-2782 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cac9b50b0d75a1d50d6c056ff65c005f3224c8e0
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://www.openwall.com/lists/oss-security/2016/02/28/9
http://www.ubuntu.com/usn/USN-2929-1
http://www.ubuntu.com/usn/USN-2929-2
http://www.ubuntu.com/usn/USN-2930-1
http://www.ubuntu.com/usn/USN-2930-2
http://www.ubuntu.com/usn/USN-2930-3
http://www.ubuntu.com/usn/USN-2932-1
http://www.ubuntu.com/usn/USN-2948-1
http://www.ubuntu.com/usn/USN-2948-2
http://www.ubuntu.com/usn/USN-2967-1
http://www.ubuntu.com/usn/USN-2967-2
https://access.redhat.com/security/cve/CVE-2016-2782
https://bugzilla.redhat.com/show_bug.cgi?id=1312670
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2782
https://github.com/torvalds/linux/commit/cac9b50b0d75a1d50d6c056ff65c005f3224c8e0
https://linux.oracle.com/cve/CVE-2016-2782.html
https://linux.oracle.com/errata/ELSA-2017-3567.html
https://nvd.nist.gov/vuln/detail/CVE-2016-2782
https://ubuntu.com/security/notices/USN-2929-1
https://ubuntu.com/security/notices/USN-2929-2
https://ubuntu.com/security/notices/USN-2930-1
https://ubuntu.com/security/notices/USN-2930-2
https://ubuntu.com/security/notices/USN-2930-3
https://ubuntu.com/security/notices/USN-2932-1
https://ubuntu.com/security/notices/USN-2948-1
https://ubuntu.com/security/notices/USN-2967-1
https://ubuntu.com/security/notices/USN-2967-2
https://www.cve.org/CVERecord?id=CVE-2016-2782
https://www.exploit-db.com/exploits/39539/
|
| kernel-headers |
CVE-2016-3136 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4e9a0b05257f29cf4b75f3209243ed71614d062e
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://seclists.org/bugtraq/2016/Mar/57
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/14/2
http://www.securityfocus.com/bid/84299
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-3000-1
https://access.redhat.com/security/cve/CVE-2016-3136
https://bugzilla.redhat.com/show_bug.cgi?id=1283370
https://bugzilla.redhat.com/show_bug.cgi?id=1317007
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136
https://github.com/torvalds/linux/commit/4e9a0b05257f29cf4b75f3209243ed71614d062e
https://nvd.nist.gov/vuln/detail/CVE-2016-3136
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-3000-1
https://www.cve.org/CVERecord?id=CVE-2016-3136
https://www.exploit-db.com/exploits/39541/
|
| kernel-headers |
CVE-2016-3137 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/55
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/14/3
http://www.securityfocus.com/bid/84300
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-3000-1
https://access.redhat.com/security/cve/CVE-2016-3137
https://bugzilla.redhat.com/show_bug.cgi?id=1283368
https://bugzilla.redhat.com/show_bug.cgi?id=1316996
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137
https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754
https://nvd.nist.gov/vuln/detail/CVE-2016-3137
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-3000-1
https://www.cve.org/CVERecord?id=CVE-2016-3137
|
| kernel-headers |
CVE-2016-3138 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8835ba4a39cf53f705417b3b3a94eb067673f2c9
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/54
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/14/4
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2969-1
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
https://access.redhat.com/security/cve/CVE-2016-3138
https://bugzilla.redhat.com/show_bug.cgi?id=1283366
https://bugzilla.redhat.com/show_bug.cgi?id=1316204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138
https://github.com/torvalds/linux/commit/8835ba4a39cf53f705417b3b3a94eb067673f2c9
https://nvd.nist.gov/vuln/detail/CVE-2016-3138
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2969-1
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://www.cve.org/CVERecord?id=CVE-2016-3138
|
| kernel-headers |
CVE-2016-3139 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=471d17148c8b4174ac5f5283a73316d12c4379bc
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
https://access.redhat.com/security/cve/CVE-2016-3139
https://bugzilla.redhat.com/show_bug.cgi?id=1283375
https://bugzilla.redhat.com/show_bug.cgi?id=1283377
https://bugzilla.redhat.com/show_bug.cgi?id=1316993
https://github.com/torvalds/linux/commit/471d17148c8b4174ac5f5283a73316d12c4379bc
https://linux.oracle.com/cve/CVE-2016-3139.html
https://linux.oracle.com/errata/ELSA-2019-4644.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3139
https://security-tracker.debian.org/tracker/CVE-2016-3139
https://www.cve.org/CVERecord?id=CVE-2016-3139
https://www.exploit-db.com/exploits/39538/
|
| kernel-headers |
CVE-2016-3140 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://seclists.org/bugtraq/2016/Mar/61
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/14/6
http://www.securityfocus.com/bid/84304
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-3000-1
https://access.redhat.com/security/cve/CVE-2016-3140
https://bugzilla.redhat.com/show_bug.cgi?id=1283378
https://bugzilla.redhat.com/show_bug.cgi?id=1316995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140
https://github.com/torvalds/linux/commit/5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f
https://linux.oracle.com/cve/CVE-2016-3140.html
https://linux.oracle.com/errata/ELSA-2017-3535.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3140
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-3000-1
https://www.cve.org/CVERecord?id=CVE-2016-3140
https://www.exploit-db.com/exploits/39537/
|
| kernel-headers |
CVE-2016-3689 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
http://www.openwall.com/lists/oss-security/2016/03/30/6
http://www.securitytracker.com/id/1035441
http://www.ubuntu.com/usn/USN-2968-1
http://www.ubuntu.com/usn/USN-2968-2
http://www.ubuntu.com/usn/USN-2970-1
http://www.ubuntu.com/usn/USN-2971-1
http://www.ubuntu.com/usn/USN-2971-2
http://www.ubuntu.com/usn/USN-2971-3
http://www.ubuntu.com/usn/USN-3000-1
https://access.redhat.com/security/cve/CVE-2016-3689
https://bugzilla.novell.com/show_bug.cgi?id=971628
https://bugzilla.redhat.com/show_bug.cgi?id=1320060
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3689
https://github.com/torvalds/linux/commit/a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff
https://nvd.nist.gov/vuln/detail/CVE-2016-3689
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2968-1
https://ubuntu.com/security/notices/USN-2968-2
https://ubuntu.com/security/notices/USN-2970-1
https://ubuntu.com/security/notices/USN-2971-1
https://ubuntu.com/security/notices/USN-2971-2
https://ubuntu.com/security/notices/USN-2971-3
https://ubuntu.com/security/notices/USN-3000-1
https://www.cve.org/CVERecord?id=CVE-2016-3689
|
| kernel-headers |
CVE-2016-3695 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/102327
https://access.redhat.com/security/cve/CVE-2016-3695
https://bugzilla.redhat.com/show_bug.cgi?id=1322755
https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
https://nvd.nist.gov/vuln/detail/CVE-2016-3695
https://www.cve.org/CVERecord?id=CVE-2016-3695
|
| kernel-headers |
CVE-2016-3951 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1666984c8625b3db19a9abc298931d35ab7bc64b
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4d06dd537f95683aba3651098ae288b7cbff8274
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
http://seclists.org/oss-sec/2016/q2/19
http://www.debian.org/security/2016/dsa-3607
http://www.openwall.com/lists/oss-security/2016/04/06/4
http://www.securityfocus.com/bid/91028
http://www.securitytracker.com/id/1036763
http://www.ubuntu.com/usn/USN-2989-1
http://www.ubuntu.com/usn/USN-2998-1
http://www.ubuntu.com/usn/USN-3000-1
http://www.ubuntu.com/usn/USN-3001-1
http://www.ubuntu.com/usn/USN-3002-1
http://www.ubuntu.com/usn/USN-3003-1
http://www.ubuntu.com/usn/USN-3004-1
http://www.ubuntu.com/usn/USN-3021-1
http://www.ubuntu.com/usn/USN-3021-2
https://access.redhat.com/security/cve/CVE-2016-3951
https://bugzilla.novell.com/show_bug.cgi?id=974418
https://bugzilla.redhat.com/show_bug.cgi?id=1324782
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1666984c8625b3db19a9abc298931d35ab7bc64b
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4d06dd537f95683aba3651098ae288b7cbff8274
https://github.com/torvalds/linux/commit/1666984c8625b3db19a9abc298931d35ab7bc64b
https://github.com/torvalds/linux/commit/4d06dd537f95683aba3651098ae288b7cbff8274
https://linux.oracle.com/cve/CVE-2016-3951.html
https://linux.oracle.com/errata/ELSA-2017-3533.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3951
https://ubuntu.com/security/notices/USN-2965-1
https://ubuntu.com/security/notices/USN-2965-2
https://ubuntu.com/security/notices/USN-2965-3
https://ubuntu.com/security/notices/USN-2965-4
https://ubuntu.com/security/notices/USN-2989-1
https://ubuntu.com/security/notices/USN-2998-1
https://ubuntu.com/security/notices/USN-3000-1
https://ubuntu.com/security/notices/USN-3001-1
https://ubuntu.com/security/notices/USN-3002-1
https://ubuntu.com/security/notices/USN-3003-1
https://ubuntu.com/security/notices/USN-3004-1
https://ubuntu.com/security/notices/USN-3021-1
https://ubuntu.com/security/notices/USN-3021-2
https://www.cve.org/CVERecord?id=CVE-2016-3951
https://www.spinics.net/lists/netdev/msg367669.html
|
| kernel-headers |
CVE-2016-4482 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=681fef8380eb818c0b845fca5d2ab1dcbab114ee
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184414.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
http://www.debian.org/security/2016/dsa-3607
http://www.openwall.com/lists/oss-security/2016/05/04/2
http://www.openwall.com/lists/oss-security/2016/05/04/6
http://www.securityfocus.com/bid/90029
http://www.spinics.net/lists/linux-usb/msg140243.html
http://www.ubuntu.com/usn/USN-3016-1
http://www.ubuntu.com/usn/USN-3016-2
http://www.ubuntu.com/usn/USN-3016-3
http://www.ubuntu.com/usn/USN-3016-4
http://www.ubuntu.com/usn/USN-3017-1
http://www.ubuntu.com/usn/USN-3017-2
http://www.ubuntu.com/usn/USN-3017-3
http://www.ubuntu.com/usn/USN-3018-1
http://www.ubuntu.com/usn/USN-3018-2
http://www.ubuntu.com/usn/USN-3019-1
http://www.ubuntu.com/usn/USN-3020-1
http://www.ubuntu.com/usn/USN-3021-1
http://www.ubuntu.com/usn/USN-3021-2
https://access.redhat.com/security/cve/CVE-2016-4482
https://bugzilla.redhat.com/show_bug.cgi?id=1332931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482
https://git.kernel.org/cgit/linux/kernel/git/gregkh/usb.git/commit/?h=usb-next&id=681fef8380eb818c0b845fca5d2ab1dcbab114ee
https://github.com/torvalds/linux/commit/681fef8380eb818c0b845fca5d2ab1dcbab114ee
https://linux.oracle.com/cve/CVE-2016-4482.html
https://linux.oracle.com/errata/ELSA-2017-3516.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4482
https://ubuntu.com/security/notices/USN-3016-1
https://ubuntu.com/security/notices/USN-3016-2
https://ubuntu.com/security/notices/USN-3016-3
https://ubuntu.com/security/notices/USN-3016-4
https://ubuntu.com/security/notices/USN-3017-1
https://ubuntu.com/security/notices/USN-3017-2
https://ubuntu.com/security/notices/USN-3017-3
https://ubuntu.com/security/notices/USN-3018-1
https://ubuntu.com/security/notices/USN-3018-2
https://ubuntu.com/security/notices/USN-3019-1
https://ubuntu.com/security/notices/USN-3020-1
https://ubuntu.com/security/notices/USN-3021-1
https://ubuntu.com/security/notices/USN-3021-2
https://www.cve.org/CVERecord?id=CVE-2016-4482
|
| kernel-headers |
CVE-2016-4486 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5
http://www.openwall.com/lists/oss-security/2016/05/04/27
http://www.openwall.com/lists/oss-security/2016/05/05/2
http://www.securityfocus.com/bid/90051
http://www.ubuntu.com/usn/USN-2989-1
http://www.ubuntu.com/usn/USN-2996-1
http://www.ubuntu.com/usn/USN-2997-1
http://www.ubuntu.com/usn/USN-2998-1
http://www.ubuntu.com/usn/USN-3000-1
http://www.ubuntu.com/usn/USN-3001-1
http://www.ubuntu.com/usn/USN-3002-1
http://www.ubuntu.com/usn/USN-3003-1
http://www.ubuntu.com/usn/USN-3004-1
http://www.ubuntu.com/usn/USN-3005-1
http://www.ubuntu.com/usn/USN-3006-1
http://www.ubuntu.com/usn/USN-3007-1
https://access.redhat.com/security/cve/CVE-2016-4486
https://bugzilla.redhat.com/show_bug.cgi?id=1333316
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486
https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6
https://github.com/torvalds/linux/commit/5f8e44741f9f216e33736ea4ec65ca9ac03036e6
https://nvd.nist.gov/vuln/detail/CVE-2016-4486
https://ubuntu.com/security/notices/USN-2989-1
https://ubuntu.com/security/notices/USN-2996-1
https://ubuntu.com/security/notices/USN-2997-1
https://ubuntu.com/security/notices/USN-2998-1
https://ubuntu.com/security/notices/USN-3000-1
https://ubuntu.com/security/notices/USN-3001-1
https://ubuntu.com/security/notices/USN-3002-1
https://ubuntu.com/security/notices/USN-3003-1
https://ubuntu.com/security/notices/USN-3004-1
https://ubuntu.com/security/notices/USN-3005-1
https://ubuntu.com/security/notices/USN-3006-1
https://ubuntu.com/security/notices/USN-3007-1
https://www.cve.org/CVERecord?id=CVE-2016-4486
https://www.exploit-db.com/exploits/46006/
|
| kernel-headers |
CVE-2016-4580 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79e48650320e6fba48369fccf13fd045315b19b8
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5
http://www.openwall.com/lists/oss-security/2016/05/10/12
http://www.securityfocus.com/bid/90528
http://www.ubuntu.com/usn/USN-3016-1
http://www.ubuntu.com/usn/USN-3016-2
http://www.ubuntu.com/usn/USN-3016-3
http://www.ubuntu.com/usn/USN-3016-4
http://www.ubuntu.com/usn/USN-3017-1
http://www.ubuntu.com/usn/USN-3017-2
http://www.ubuntu.com/usn/USN-3017-3
http://www.ubuntu.com/usn/USN-3018-1
http://www.ubuntu.com/usn/USN-3018-2
http://www.ubuntu.com/usn/USN-3019-1
http://www.ubuntu.com/usn/USN-3020-1
http://www.ubuntu.com/usn/USN-3021-1
http://www.ubuntu.com/usn/USN-3021-2
https://access.redhat.com/security/cve/CVE-2016-4580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580
https://github.com/torvalds/linux/commit/79e48650320e6fba48369fccf13fd045315b19b8
https://linux.oracle.com/cve/CVE-2016-4580.html
https://linux.oracle.com/errata/ELSA-2017-3535.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4580
https://ubuntu.com/security/notices/USN-3016-1
https://ubuntu.com/security/notices/USN-3016-2
https://ubuntu.com/security/notices/USN-3016-3
https://ubuntu.com/security/notices/USN-3016-4
https://ubuntu.com/security/notices/USN-3017-1
https://ubuntu.com/security/notices/USN-3017-2
https://ubuntu.com/security/notices/USN-3017-3
https://ubuntu.com/security/notices/USN-3018-1
https://ubuntu.com/security/notices/USN-3018-2
https://ubuntu.com/security/notices/USN-3019-1
https://ubuntu.com/security/notices/USN-3020-1
https://ubuntu.com/security/notices/USN-3021-1
https://ubuntu.com/security/notices/USN-3021-2
https://www.cve.org/CVERecord?id=CVE-2016-4580
|
| kernel-headers |
CVE-2016-4805 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html
http://seclists.org/oss-sec/2016/q2/346
http://www.debian.org/security/2016/dsa-3607
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2
http://www.openwall.com/lists/oss-security/2016/05/15/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/bid/90605
http://www.securitytracker.com/id/1036763
http://www.ubuntu.com/usn/USN-3021-1
http://www.ubuntu.com/usn/USN-3021-2
https://access.redhat.com/security/cve/CVE-2016-4805
https://bugzilla.redhat.com/show_bug.cgi?id=1335803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805
https://github.com/torvalds/linux/commit/1f461dcdd296eecedaffffc6bae2bfa90bd7eb89
https://linux.oracle.com/cve/CVE-2016-4805.html
https://linux.oracle.com/errata/ELSA-2016-3596.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4805
https://ubuntu.com/security/notices/USN-3021-1
https://ubuntu.com/security/notices/USN-3021-2
https://www.cve.org/CVERecord?id=CVE-2016-4805
|
| kernel-headers |
CVE-2016-6130 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6
http://www.debian.org/security/2016/dsa-3616
http://www.securityfocus.com/archive/1/538803/30/0/threaded
http://www.securityfocus.com/bid/91540
https://access.redhat.com/security/cve/CVE-2016-6130
https://bugzilla.kernel.org/show_bug.cgi?id=116741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6130
https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6
https://nvd.nist.gov/vuln/detail/CVE-2016-6130
https://ubuntu.com/security/notices/USN-3099-1
https://www.cve.org/CVERecord?id=CVE-2016-6130
|
| kernel-headers |
CVE-2016-7425 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7bc2b55a5c030685b399bb65b6baa9ccc3d1f167
http://marc.info/?l=linux-scsi&m=147394713328707&w=2
http://marc.info/?l=linux-scsi&m=147394796228991&w=2
http://www.openwall.com/lists/oss-security/2016/09/17/2
http://www.securityfocus.com/bid/93037
http://www.ubuntu.com/usn/USN-3144-1
http://www.ubuntu.com/usn/USN-3144-2
http://www.ubuntu.com/usn/USN-3145-1
http://www.ubuntu.com/usn/USN-3145-2
http://www.ubuntu.com/usn/USN-3146-1
http://www.ubuntu.com/usn/USN-3146-2
http://www.ubuntu.com/usn/USN-3147-1
https://access.redhat.com/security/cve/CVE-2016-7425
https://bugzilla.redhat.com/show_bug.cgi?id=1377330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425
https://github.com/torvalds/linux/commit/7bc2b55a5c030685b399bb65b6baa9ccc3d1f167
https://linux.oracle.com/cve/CVE-2016-7425.html
https://linux.oracle.com/errata/ELSA-2017-3535.html
https://nvd.nist.gov/vuln/detail/CVE-2016-7425
https://security-tracker.debian.org/tracker/CVE-2016-7425
https://ubuntu.com/security/notices/USN-3144-1
https://ubuntu.com/security/notices/USN-3144-2
https://ubuntu.com/security/notices/USN-3145-1
https://ubuntu.com/security/notices/USN-3145-2
https://ubuntu.com/security/notices/USN-3146-1
https://ubuntu.com/security/notices/USN-3146-2
https://ubuntu.com/security/notices/USN-3147-1
https://ubuntu.com/security/notices/USN-3161-3
https://ubuntu.com/security/notices/USN-3161-4
https://ubuntu.com/security/notices/USN-3162-2
https://www.cve.org/CVERecord?id=CVE-2016-7425
|
| kernel-headers |
CVE-2016-7916 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8148a73c9901a8794a50f950083c00ccf97d43b3
http://source.android.com/security/bulletin/2016-11-01.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.4
http://www.securityfocus.com/bid/94138
http://www.ubuntu.com/usn/USN-3159-1
http://www.ubuntu.com/usn/USN-3159-2
https://access.redhat.com/security/cve/CVE-2016-7916
https://bugzilla.kernel.org/show_bug.cgi?id=116461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7916
https://forums.grsecurity.net/viewtopic.php?f=3&t=4363
https://github.com/torvalds/linux/commit/8148a73c9901a8794a50f950083c00ccf97d43b3
https://nvd.nist.gov/vuln/detail/CVE-2016-7916
https://ubuntu.com/security/notices/USN-3159-1
https://ubuntu.com/security/notices/USN-3159-2
https://ubuntu.com/security/notices/USN-3160-1
https://ubuntu.com/security/notices/USN-3160-2
https://www.cve.org/CVERecord?id=CVE-2016-7916
|
| kernel-headers |
CVE-2016-8405 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.debian.org/security/2017/dsa-3791
http://www.securityfocus.com/bid/94686
https://access.redhat.com/security/cve/CVE-2016-8405
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405
https://marc.info/?l=linux-kernel&m=148365805203921&w=2
https://nvd.nist.gov/vuln/detail/CVE-2016-8405
https://source.android.com/security/bulletin/2016-12-01.html
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3381-1
https://ubuntu.com/security/notices/USN-3381-2
https://www.cve.org/CVERecord?id=CVE-2016-8405
|
| kernel-headers |
CVE-2016-8658 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ded89912156b1a47d940a0c954c43afbabd0c42c
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.5
http://www.openwall.com/lists/oss-security/2016/10/13/1
http://www.securityfocus.com/bid/93541
http://www.ubuntu.com/usn/USN-3145-1
http://www.ubuntu.com/usn/USN-3145-2
http://www.ubuntu.com/usn/USN-3146-1
http://www.ubuntu.com/usn/USN-3146-2
https://access.redhat.com/security/cve/CVE-2016-8658
https://bugzilla.redhat.com/show_bug.cgi?id=1384403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8658
https://github.com/torvalds/linux/commit/ded89912156b1a47d940a0c954c43afbabd0c42c
https://nvd.nist.gov/vuln/detail/CVE-2016-8658
https://ubuntu.com/security/notices/USN-3145-1
https://ubuntu.com/security/notices/USN-3145-2
https://ubuntu.com/security/notices/USN-3146-1
https://ubuntu.com/security/notices/USN-3146-2
https://ubuntu.com/security/notices/USN-3161-3
https://ubuntu.com/security/notices/USN-3161-4
https://www.cve.org/CVERecord?id=CVE-2016-8658
|
| kernel-headers |
CVE-2016-9178 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1c109fabbd51863475cd12ac206bdd249aee35af
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.5
http://www.openwall.com/lists/oss-security/2016/11/03/2
http://www.openwall.com/lists/oss-security/2016/11/04/4
http://www.securityfocus.com/bid/94144
https://access.redhat.com/security/cve/CVE-2016-9178
https://bugzilla.redhat.com/show_bug.cgi?id=1391908
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9178
https://github.com/torvalds/linux/commit/1c109fabbd51863475cd12ac206bdd249aee35af
https://linux.oracle.com/cve/CVE-2016-9178.html
https://linux.oracle.com/errata/ELSA-2017-3534.html
https://nvd.nist.gov/vuln/detail/CVE-2016-9178
https://ubuntu.com/security/notices/USN-3161-3
https://ubuntu.com/security/notices/USN-3422-1
https://ubuntu.com/security/notices/USN-3422-2
https://www.cve.org/CVERecord?id=CVE-2016-9178
|
| kernel-headers |
CVE-2016-9756 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2117d5398c81554fbf803f5fd1dc55eb78216c0c
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00000.html
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.12
http://www.openwall.com/lists/oss-security/2016/12/01/1
http://www.securityfocus.com/bid/94615
https://access.redhat.com/security/cve/CVE-2016-9756
https://bugzilla.redhat.com/show_bug.cgi?id=1400468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9756
https://github.com/torvalds/linux/commit/2117d5398c81554fbf803f5fd1dc55eb78216c0c
https://linux.oracle.com/cve/CVE-2016-9756.html
https://linux.oracle.com/errata/ELSA-2017-3533.html
https://nvd.nist.gov/vuln/detail/CVE-2016-9756
https://ubuntu.com/security/notices/USN-3167-1
https://ubuntu.com/security/notices/USN-3167-2
https://ubuntu.com/security/notices/USN-3168-1
https://ubuntu.com/security/notices/USN-3168-2
https://ubuntu.com/security/notices/USN-3169-1
https://ubuntu.com/security/notices/USN-3169-2
https://ubuntu.com/security/notices/USN-3170-1
https://www.cve.org/CVERecord?id=CVE-2016-9756
|
| kernel-headers |
CVE-2017-0605 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2017-0605
https://nvd.nist.gov/vuln/detail/CVE-2017-0605
https://www.cve.org/CVERecord?id=CVE-2017-0605
|
| kernel-headers |
CVE-2017-0627 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/98205
https://access.redhat.com/security/cve/CVE-2017-0627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0627
https://github.com/LineageOS/android_kernel_lge_g3/commit/f85c1738998cdbd67e158e1f3b2af8f7c62a269e
https://nvd.nist.gov/vuln/detail/CVE-2017-0627
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-uvc-driver
https://ubuntu.com/security/notices/USN-3674-1
https://ubuntu.com/security/notices/USN-3674-2
https://usn.ubuntu.com/3674-1/
https://usn.ubuntu.com/3674-2/
https://www.cve.org/CVERecord?id=CVE-2017-0627
|
| kernel-headers |
CVE-2017-0630 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/98213
https://access.redhat.com/security/cve/CVE-2017-0630
https://nvd.nist.gov/vuln/detail/CVE-2017-0630
https://source.android.com/security/bulletin/2017-05-01
https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
https://www.cve.org/CVERecord?id=CVE-2017-0630
|
| kernel-headers |
CVE-2017-1000365 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.securityfocus.com/bid/99156
https://access.redhat.com/security/cve/CVE-2017-1000365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365
https://linux.oracle.com/cve/CVE-2017-1000365.html
https://linux.oracle.com/errata/ELSA-2017-3622.html
https://nvd.nist.gov/vuln/detail/CVE-2017-1000365
https://patchwork.kernel.org/patch/9803203/
https://ubuntu.com/security/notices/USN-3377-1
https://ubuntu.com/security/notices/USN-3377-2
https://ubuntu.com/security/notices/USN-3378-1
https://ubuntu.com/security/notices/USN-3378-2
https://ubuntu.com/security/notices/USN-3381-1
https://ubuntu.com/security/notices/USN-3381-2
https://www.cve.org/CVERecord?id=CVE-2017-1000365
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
|
| kernel-headers |
CVE-2017-1000371 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/99131
https://access.redhat.com/security/cve/CVE-2017-1000371
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371
https://linux.oracle.com/cve/CVE-2017-1000371.html
https://linux.oracle.com/errata/ELSA-2020-1524.html
https://nvd.nist.gov/vuln/detail/CVE-2017-1000371
https://www.cve.org/CVERecord?id=CVE-2017-1000371
https://www.exploit-db.com/exploits/42273/
https://www.exploit-db.com/exploits/42276/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
|
| kernel-headers |
CVE-2017-1000379 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/99284
https://access.redhat.com/errata/RHSA-2017:1482
https://access.redhat.com/errata/RHSA-2017:1484
https://access.redhat.com/errata/RHSA-2017:1485
https://access.redhat.com/errata/RHSA-2017:1486
https://access.redhat.com/errata/RHSA-2017:1487
https://access.redhat.com/errata/RHSA-2017:1488
https://access.redhat.com/errata/RHSA-2017:1489
https://access.redhat.com/errata/RHSA-2017:1490
https://access.redhat.com/errata/RHSA-2017:1491
https://access.redhat.com/errata/RHSA-2017:1616
https://access.redhat.com/errata/RHSA-2017:1647
https://access.redhat.com/errata/RHSA-2017:1712
https://access.redhat.com/errata/RHSA-2017:1842
https://access.redhat.com/security/cve/CVE-2017-1000379
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000379
https://nvd.nist.gov/vuln/detail/CVE-2017-1000379
https://www.cve.org/CVERecord?id=CVE-2017-1000379
https://www.exploit-db.com/exploits/42275/
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
|
| kernel-headers |
CVE-2017-10810 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=385aee965b4e4c36551c362a334378d2985b722a
http://www.debian.org/security/2017/dsa-3927
http://www.securityfocus.com/bid/99433
https://access.redhat.com/security/cve/CVE-2017-10810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10810
https://github.com/torvalds/linux/commit/385aee965b4e4c36551c362a334378d2985b722a
https://lkml.org/lkml/2017/4/6/668
https://nvd.nist.gov/vuln/detail/CVE-2017-10810
https://ubuntu.com/security/notices/USN-3377-1
https://ubuntu.com/security/notices/USN-3377-2
https://ubuntu.com/security/notices/USN-3378-1
https://ubuntu.com/security/notices/USN-3378-2
https://www.cve.org/CVERecord?id=CVE-2017-10810
|
| kernel-headers |
CVE-2017-11473 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/100010
https://access.redhat.com/errata/RHSA-2018:0654
https://access.redhat.com/security/cve/CVE-2017-11473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11473
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=70ac67826602edf8c0ccb413e5ba7eacf597a60c
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=96301209473afd3f2f274b91cb7082d161b9be65
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=dad5ab0db8deac535d03e3fe3d8f2892173fa6a4
https://linux.oracle.com/cve/CVE-2017-11473.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://nvd.nist.gov/vuln/detail/CVE-2017-11473
https://source.android.com/security/bulletin/pixel/2018-01-01
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-11473
|
| kernel-headers |
CVE-2017-12153 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://seclists.org/oss-sec/2017/q3/437
http://www.debian.org/security/2017/dsa-3981
http://www.securityfocus.com/bid/100855
https://access.redhat.com/security/cve/CVE-2017-12153
https://bugzilla.novell.com/show_bug.cgi?id=1058410
https://bugzilla.redhat.com/show_bug.cgi?id=1491046
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153
https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888
https://linux.oracle.com/cve/CVE-2017-12153.html
https://linux.oracle.com/errata/ELSA-2019-4531.html
https://marc.info/?l=linux-wireless&m=150525493517953&w=2
https://marc.info/?t=150525503100001&r=1&w=2
https://nvd.nist.gov/vuln/detail/CVE-2017-12153
https://ubuntu.com/security/notices/USN-3469-1
https://ubuntu.com/security/notices/USN-3469-2
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://www.cve.org/CVERecord?id=CVE-2017-12153
|
| kernel-headers |
CVE-2017-12762 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://seclists.org/oss-sec/2017/q3/274
http://www.openwall.com/lists/oss-security/2020/02/11/1
http://www.openwall.com/lists/oss-security/2020/02/11/2
http://www.openwall.com/lists/oss-security/2020/02/14/4
http://www.securityfocus.com/bid/100251
https://access.redhat.com/security/cve/CVE-2017-12762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12762
https://nvd.nist.gov/vuln/detail/CVE-2017-12762
https://patchwork.kernel.org/patch/9880041/
https://ubuntu.com/security/notices/USN-3420-1
https://ubuntu.com/security/notices/USN-3420-2
https://ubuntu.com/security/notices/USN-3620-1
https://ubuntu.com/security/notices/USN-3620-2
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
https://www.cve.org/CVERecord?id=CVE-2017-12762
|
| kernel-headers |
CVE-2017-14140 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=197e7e521384a23b9e585178f3f11c9fa08274b9
http://www.debian.org/security/2017/dsa-3981
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.9
http://www.securityfocus.com/bid/100876
https://access.redhat.com/errata/RHSA-2018:0676
https://access.redhat.com/errata/RHSA-2018:1062
https://access.redhat.com/security/cve/CVE-2017-14140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140
https://github.com/torvalds/linux/commit/197e7e521384a23b9e585178f3f11c9fa08274b9
https://linux.oracle.com/cve/CVE-2017-14140.html
https://linux.oracle.com/errata/ELSA-2018-4025.html
https://nvd.nist.gov/vuln/detail/CVE-2017-14140
https://source.android.com/security/bulletin/pixel/2018-01-01
https://ubuntu.com/security/notices/USN-3444-1
https://ubuntu.com/security/notices/USN-3444-2
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://www.cve.org/CVERecord?id=CVE-2017-14140
|
| kernel-headers |
CVE-2017-15115 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://seclists.org/oss-sec/2017/q4/282
http://www.securityfocus.com/bid/101877
https://access.redhat.com/security/cve/CVE-2017-15115
https://bugzilla.redhat.com/show_bug.cgi?id=1513345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15115
https://git.kernel.org/linus/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
https://github.com/torvalds/linux/commit/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
https://linux.oracle.com/cve/CVE-2017-15115.html
https://linux.oracle.com/errata/ELSA-2018-4025.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-15115
https://patchwork.ozlabs.org/patch/827077/
https://source.android.com/security/bulletin/pixel/2018-04-01
https://ubuntu.com/security/notices/USN-3581-1
https://ubuntu.com/security/notices/USN-3581-2
https://ubuntu.com/security/notices/USN-3581-3
https://ubuntu.com/security/notices/USN-3582-1
https://ubuntu.com/security/notices/USN-3582-2
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3581-1/
https://usn.ubuntu.com/3581-2/
https://usn.ubuntu.com/3581-3/
https://usn.ubuntu.com/3582-1/
https://usn.ubuntu.com/3582-2/
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://www.cve.org/CVERecord?id=CVE-2017-15115
|
| kernel-headers |
CVE-2017-16525 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/102028
https://access.redhat.com/security/cve/CVE-2017-16525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16525
https://github.com/torvalds/linux/commit/299d7572e46f98534033a9e65973f13ad1ce9047
https://github.com/torvalds/linux/commit/bd998c2e0df0469707503023d50d46cf0b10c787
https://groups.google.com/d/msg/syzkaller/cMACrmo1x0k/4KhRoUgABAAJ
https://linux.oracle.com/cve/CVE-2017-16525.html
https://linux.oracle.com/errata/ELSA-2018-4041.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16525
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://www.cve.org/CVERecord?id=CVE-2017-16525
|
| kernel-headers |
CVE-2017-16526 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2017-16526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526
https://github.com/torvalds/linux/commit/bbf26183b7a6236ba602f4d6a2f7cade35bba043
https://groups.google.com/d/msg/syzkaller/zROBxKXzHDk/5I6aZ3O2AgAJ
https://linux.oracle.com/cve/CVE-2017-16526.html
https://linux.oracle.com/errata/ELSA-2018-4040.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16526
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-16526
https://www.debian.org/security/2018/dsa-4187
|
| kernel-headers |
CVE-2017-16527 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2017-16527
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16527
https://github.com/torvalds/linux/commit/124751d5e63c823092060074bd0abaae61aaa9c4
https://groups.google.com/d/msg/syzkaller/jf7GTr_g2CU/iVlLhMciCQAJ
https://linux.oracle.com/cve/CVE-2017-16527.html
https://linux.oracle.com/errata/ELSA-2017-3651.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16527
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-16527
|
| kernel-headers |
CVE-2017-16529 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/103284
https://access.redhat.com/security/cve/CVE-2017-16529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16529
https://github.com/torvalds/linux/commit/bfc81a8bc18e3c4ba0cbaa7666ff76be2f998991
https://groups.google.com/d/msg/syzkaller/rDzv5RP_f2M/M5au06qmAwAJ
https://linux.oracle.com/cve/CVE-2017-16529.html
https://linux.oracle.com/errata/ELSA-2018-4041.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16529
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-16529
|
| kernel-headers |
CVE-2017-16530 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2017-16530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16530
https://github.com/torvalds/linux/commit/786de92b3cb26012d3d0f00ee37adf14527f35c4
https://groups.google.com/d/msg/syzkaller/pCswO77gRlM/VHuPOftgAwAJ
https://linux.oracle.com/cve/CVE-2017-16530.html
https://linux.oracle.com/errata/ELSA-2018-4001.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16530
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://www.cve.org/CVERecord?id=CVE-2017-16530
|
| kernel-headers |
CVE-2017-16531 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/102025
https://access.redhat.com/security/cve/CVE-2017-16531
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16531
https://github.com/torvalds/linux/commit/bd7a3fe770ebd8391d1c7d072ff88e9e76d063eb
https://groups.google.com/d/msg/syzkaller/hP6L-m59m_8/Co2ouWeFAwAJ
https://linux.oracle.com/cve/CVE-2017-16531.html
https://linux.oracle.com/errata/ELSA-2018-4041.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16531
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-16531
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| kernel-headers |
CVE-2017-16532 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2017-16532
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16532
https://github.com/torvalds/linux/commit/7c80f9e4a588f1925b07134bb2e3689335f6c6d8
https://groups.google.com/d/msg/syzkaller/l3870gs3LhA/y79DYQdFBAAJ
https://linux.oracle.com/cve/CVE-2017-16532.html
https://linux.oracle.com/errata/ELSA-2018-4110.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16532
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-16532
|
| kernel-headers |
CVE-2017-16533 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/102026
https://access.redhat.com/security/cve/CVE-2017-16533
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16533
https://github.com/torvalds/linux/commit/f043bfc98c193c284e2cd768fefabe18ac2fed9b
https://groups.google.com/d/msg/syzkaller/CxkJ9QZgwlM/O3IOvAaGAwAJ
https://linux.oracle.com/cve/CVE-2017-16533.html
https://linux.oracle.com/errata/ELSA-2018-4001.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16533
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-16533
|
| kernel-headers |
CVE-2017-16534 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
https://access.redhat.com/security/cve/CVE-2017-16534
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16534
https://github.com/torvalds/linux/commit/2e1c42391ff2556387b3cb6308b24f6f65619feb
https://groups.google.com/d/msg/syzkaller/nXnjqI73uPo/6sUyq6kqAgAJ
https://nvd.nist.gov/vuln/detail/CVE-2017-16534
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3487-1
https://www.cve.org/CVERecord?id=CVE-2017-16534
|
| kernel-headers |
CVE-2017-16535 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/102022
https://access.redhat.com/security/cve/CVE-2017-16535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16535
https://github.com/torvalds/linux/commit/1c0edc3633b56000e18d82fc241e3995ca18a69e
https://groups.google.com/d/msg/syzkaller/tzdz2fTB1K0/OvjIgLSTAgAJ
https://linux.oracle.com/cve/CVE-2017-16535.html
https://linux.oracle.com/errata/ELSA-2018-4040.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16535
https://ubuntu.com/security/notices/USN-3485-1
https://ubuntu.com/security/notices/USN-3485-2
https://ubuntu.com/security/notices/USN-3485-3
https://ubuntu.com/security/notices/USN-3507-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-16535
|
| kernel-headers |
CVE-2017-16536 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2017-16536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16536
https://groups.google.com/d/msg/syzkaller/WlUAVfDvpRk/1V1xuEA4AgAJ
https://linux.oracle.com/cve/CVE-2017-16536.html
https://linux.oracle.com/errata/ELSA-2018-4001.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16536
https://patchwork.kernel.org/patch/9963527/
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-16536
|
| kernel-headers |
CVE-2017-16537 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2017-16537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16537
https://groups.google.com/d/msg/syzkaller/bBFN8imrjjo/-5jCl8EiCQAJ
https://linux.oracle.com/cve/CVE-2017-16537.html
https://linux.oracle.com/errata/ELSA-2022-9852.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16537
https://patchwork.kernel.org/patch/9994017/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-16537
|
| kernel-headers |
CVE-2017-16538 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
https://access.redhat.com/security/cve/CVE-2017-16538
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538
https://git.linuxtv.org/media_tree.git/commit/?id=3d932ee27e852e4904647f15b64dedca51187ad7
https://git.linuxtv.org/media_tree.git/commit/?id=7bf7a7116ed313c601307f7e585419369926ab05
https://groups.google.com/d/msg/syzkaller/XwNidsl4X04/ti6I2IaRBAAJ
https://linux.oracle.com/cve/CVE-2017-16538.html
https://linux.oracle.com/errata/ELSA-2020-5750.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16538
https://patchwork.linuxtv.org/patch/44566/
https://patchwork.linuxtv.org/patch/44567/
https://ubuntu.com/security/notices/USN-3631-1
https://ubuntu.com/security/notices/USN-3631-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3631-1/
https://usn.ubuntu.com/3631-2/
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-16538
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
|
| kernel-headers |
CVE-2017-16643 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11
http://www.securityfocus.com/bid/101769
https://access.redhat.com/security/cve/CVE-2017-16643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16643
https://github.com/torvalds/linux/commit/a50829479f58416a013a4ccca791336af3c584c7
https://groups.google.com/d/msg/syzkaller/McWFcOsA47Y/3bjtBBgaBAAJ
https://linux.oracle.com/cve/CVE-2017-16643.html
https://linux.oracle.com/errata/ELSA-2018-4110.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16643
https://ubuntu.com/security/notices/USN-3507-1
https://ubuntu.com/security/notices/USN-3509-1
https://ubuntu.com/security/notices/USN-3509-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-16643
|
| kernel-headers |
CVE-2017-16644 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/101842
https://access.redhat.com/security/cve/CVE-2017-16644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644
https://git.linuxtv.org/media_tree.git/commit/?id=c0f71bbb810237a38734607ca4599632f7f5d47f
https://groups.google.com/d/msg/syzkaller/ngC5SLvxPm4/gduhCARhAwAJ
https://linux.oracle.com/cve/CVE-2017-16644.html
https://linux.oracle.com/errata/ELSA-2020-5837.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16644
https://patchwork.kernel.org/patch/9966135/
https://ubuntu.com/security/notices/USN-3754-1
https://ubuntu.com/security/notices/USN-4904-1
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-16644
https://www.debian.org/security/2017/dsa-4073
|
| kernel-headers |
CVE-2017-16646 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/101846
https://access.redhat.com/security/cve/CVE-2017-16646
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16646
https://groups.google.com/d/msg/syzkaller/-d6ilzbVu_g/OBy8_62mAwAJ
https://linux.oracle.com/cve/CVE-2017-16646.html
https://linux.oracle.com/errata/ELSA-2018-4071.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16646
https://patchwork.linuxtv.org/patch/45291/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://www.cve.org/CVERecord?id=CVE-2017-16646
|
| kernel-headers |
CVE-2017-16647 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/101767
https://access.redhat.com/security/cve/CVE-2017-16647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16647
https://groups.google.com/d/msg/syzkaller/_9a6pd-p_0E/OnmnplQuAgAJ
https://nvd.nist.gov/vuln/detail/CVE-2017-16647
https://patchwork.ozlabs.org/patch/834686/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://www.cve.org/CVERecord?id=CVE-2017-16647
|
| kernel-headers |
CVE-2017-16649 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/101761
https://access.redhat.com/security/cve/CVE-2017-16649
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16649
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=2cb80187ba065d7decad7c6614e35e07aec8a974
https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16649
https://patchwork.ozlabs.org/patch/834771/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3822-1
https://ubuntu.com/security/notices/USN-3822-2
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3822-1/
https://usn.ubuntu.com/3822-2/
https://www.cve.org/CVERecord?id=CVE-2017-16649
|
| kernel-headers |
CVE-2017-16650 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/101791
https://access.redhat.com/security/cve/CVE-2017-16650
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16650
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=7fd078337201cf7468f53c3d9ef81ff78cb6df3b
https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ
https://linux.oracle.com/cve/CVE-2017-16650.html
https://linux.oracle.com/errata/ELSA-2019-4644.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16650
https://patchwork.ozlabs.org/patch/834770/
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-16650
|
| kernel-headers |
CVE-2017-17450 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
http://www.securityfocus.com/bid/102110
https://access.redhat.com/security/cve/CVE-2017-17450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450
https://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf.git/commit/?id=916a27901de01446bcf57ecca4783f6cff493309
https://linux.oracle.com/cve/CVE-2017-17450.html
https://linux.oracle.com/errata/ELSA-2019-4317.html
https://lkml.org/lkml/2017/12/5/982
https://nvd.nist.gov/vuln/detail/CVE-2017-17450
https://ubuntu.com/security/notices/USN-3583-1
https://ubuntu.com/security/notices/USN-3583-2
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3583-1/
https://usn.ubuntu.com/3583-2/
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3632-1/
https://www.cve.org/CVERecord?id=CVE-2017-17450
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
|
| kernel-headers |
CVE-2017-17741 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/102227
https://access.redhat.com/security/cve/CVE-2017-17741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741
https://linux.oracle.com/cve/CVE-2017-17741.html
https://linux.oracle.com/errata/ELSA-2018-4172.html
https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-17741
https://ubuntu.com/security/notices/USN-3617-1
https://ubuntu.com/security/notices/USN-3617-2
https://ubuntu.com/security/notices/USN-3617-3
https://ubuntu.com/security/notices/USN-3619-1
https://ubuntu.com/security/notices/USN-3619-2
https://ubuntu.com/security/notices/USN-3620-1
https://ubuntu.com/security/notices/USN-3620-2
https://ubuntu.com/security/notices/USN-3632-1
https://usn.ubuntu.com/3617-1/
https://usn.ubuntu.com/3617-2/
https://usn.ubuntu.com/3617-3/
https://usn.ubuntu.com/3619-1/
https://usn.ubuntu.com/3619-2/
https://usn.ubuntu.com/3620-1/
https://usn.ubuntu.com/3620-2/
https://usn.ubuntu.com/3632-1/
https://www.cve.org/CVERecord?id=CVE-2017-17741
https://www.debian.org/security/2017/dsa-4073
https://www.debian.org/security/2018/dsa-4082
https://www.spinics.net/lists/kvm/msg160710.html
https://www.spinics.net/lists/kvm/msg160796.html
|
| kernel-headers |
CVE-2017-5549 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=146cc8a17a3b4996f6805ee5c080e7101277c410
http://seclists.org/oss-sec/2017/q1/161
http://www.debian.org/security/2017/dsa-3791
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5
http://www.openwall.com/lists/oss-security/2017/01/21/3
http://www.securityfocus.com/bid/95715
https://access.redhat.com/security/cve/CVE-2017-5549
https://bugzilla.redhat.com/show_bug.cgi?id=1416114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549
https://github.com/torvalds/linux/commit/146cc8a17a3b4996f6805ee5c080e7101277c410
https://nvd.nist.gov/vuln/detail/CVE-2017-5549
https://ubuntu.com/security/notices/USN-3208-1
https://ubuntu.com/security/notices/USN-3208-2
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-5549
|
| kernel-headers |
CVE-2017-5897 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.debian.org/security/2017/dsa-3791
http://www.openwall.com/lists/oss-security/2017/02/07/2
http://www.securityfocus.com/bid/96037
http://www.securitytracker.com/id/1037794
https://access.redhat.com/security/cve/CVE-2017-5897
https://bugzilla.redhat.com/show_bug.cgi?id=1419848
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=7892032cfe67f4bde6fc2ee967e45a8fbaf33756
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=7892032cfe67f4bde6fc2ee967e45a8fbaf33756
https://linux.oracle.com/cve/CVE-2017-5897.html
https://linux.oracle.com/errata/ELSA-2017-3533.html
https://nvd.nist.gov/vuln/detail/CVE-2017-5897
https://source.android.com/security/bulletin/2017-09-01
https://ubuntu.com/security/notices/USN-3265-1
https://ubuntu.com/security/notices/USN-3265-2
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-5897
|
| kernel-headers |
CVE-2017-5967 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?id=dfb4357da6ddbdf57d583ba64361c9d792b0e0b1
http://www.securityfocus.com/bid/96271
https://access.redhat.com/security/cve/CVE-2017-5967
https://bugzilla.kernel.org/show_bug.cgi?id=193921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5967
https://nvd.nist.gov/vuln/detail/CVE-2017-5967
https://ubuntu.com/security/notices/USN-4904-1
https://www.cve.org/CVERecord?id=CVE-2017-5967
|
| kernel-headers |
CVE-2017-7261 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://marc.info/?t=149037004200005&r=1&w=2
http://www.securityfocus.com/bid/97096
https://access.redhat.com/security/cve/CVE-2017-7261
https://bugzilla.redhat.com/show_bug.cgi?id=1435719
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7261
https://linux.oracle.com/cve/CVE-2017-7261.html
https://linux.oracle.com/errata/ELSA-2020-5671.html
https://lists.freedesktop.org/archives/dri-devel/2017-March/136814.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7261
https://ubuntu.com/security/notices/USN-3291-1
https://ubuntu.com/security/notices/USN-3291-2
https://ubuntu.com/security/notices/USN-3291-3
https://ubuntu.com/security/notices/USN-3293-1
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3406-1
https://ubuntu.com/security/notices/USN-3406-2
https://www.cve.org/CVERecord?id=CVE-2017-7261
|
| kernel-headers |
CVE-2017-7273 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1ebb71143758f45dc0fa76e2f48429e13b16d110
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4faec4a2ef5dd481682cc155cb9ea14ba2534b76
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.4
http://www.securityfocus.com/bid/97190
https://access.redhat.com/security/cve/CVE-2017-7273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7273
https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110
https://linux.oracle.com/cve/CVE-2017-7273.html
https://linux.oracle.com/errata/ELSA-2017-3597.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7273
https://ubuntu.com/security/notices/USN-3361-1
https://ubuntu.com/security/notices/USN-3406-1
https://ubuntu.com/security/notices/USN-3406-2
https://www.cve.org/CVERecord?id=CVE-2017-7273
|
| kernel-headers |
CVE-2017-7346 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://marc.info/?l=linux-kernel&m=149086968410117&w=2
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.openwall.com/lists/oss-security/2017/03/29/1
http://www.securityfocus.com/bid/97257
https://access.redhat.com/security/cve/CVE-2017-7346
https://bugzilla.redhat.com/show_bug.cgi?id=1437431
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346
https://github.com/torvalds/linux/commit/ee9c4e681ec4f58e42a83cb0c22a0289ade1aacf
https://linux.oracle.com/cve/CVE-2017-7346.html
https://linux.oracle.com/errata/ELSA-2020-5670.html
https://lists.freedesktop.org/archives/dri-devel/2017-March/137429.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7346
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
https://www.cve.org/CVERecord?id=CVE-2017-7346
|
| kernel-headers |
CVE-2017-8831 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/archive/1/540770/30/0/threaded
http://www.securityfocus.com/bid/99619
https://access.redhat.com/security/cve/CVE-2017-8831
https://bugzilla.kernel.org/show_bug.cgi?id=195559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831
https://github.com/stoth68000/media-tree/commit/354dd3924a2e43806774953de536257548b5002c
https://linux.oracle.com/cve/CVE-2017-8831.html
https://linux.oracle.com/errata/ELSA-2017-3637.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-8831
https://ubuntu.com/security/notices/USN-3420-1
https://ubuntu.com/security/notices/USN-3420-2
https://ubuntu.com/security/notices/USN-3754-1
https://usn.ubuntu.com/3754-1/
https://www.cve.org/CVERecord?id=CVE-2017-8831
|
| kernel-headers |
CVE-2017-8924 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=654b404f2a222f918af9b0cd18ad469d0c941a8e
http://www.debian.org/security/2017/dsa-3886
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.4
http://www.securityfocus.com/bid/98451
https://access.redhat.com/security/cve/CVE-2017-8924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924
https://github.com/torvalds/linux/commit/654b404f2a222f918af9b0cd18ad469d0c941a8e
https://linux.oracle.com/cve/CVE-2017-8924.html
https://linux.oracle.com/errata/ELSA-2020-5881.html
https://nvd.nist.gov/vuln/detail/CVE-2017-8924
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3361-1
https://www.cve.org/CVERecord?id=CVE-2017-8924
|
| kernel-headers |
CVE-2017-8925 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30572418b445d85fcfe6c8fe84c947d2606767d8
http://www.debian.org/security/2017/dsa-3886
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.4
http://www.securityfocus.com/bid/98462
https://access.redhat.com/security/cve/CVE-2017-8925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925
https://github.com/torvalds/linux/commit/30572418b445d85fcfe6c8fe84c947d2606767d8
https://linux.oracle.com/cve/CVE-2017-8925.html
https://linux.oracle.com/errata/ELSA-2020-5936.html
https://nvd.nist.gov/vuln/detail/CVE-2017-8925
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3361-1
https://www.cve.org/CVERecord?id=CVE-2017-8925
|
| kernel-headers |
CVE-2017-9605 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07678eca2cf9c9a18584e546c2b2a0d0c9a3150c
http://www.debian.org/security/2017/dsa-3927
http://www.debian.org/security/2017/dsa-3945
http://www.openwall.com/lists/oss-security/2017/06/13/2
http://www.securityfocus.com/bid/99095
https://access.redhat.com/security/cve/CVE-2017-9605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605
https://github.com/torvalds/linux/commit/07678eca2cf9c9a18584e546c2b2a0d0c9a3150c
https://linux.oracle.com/cve/CVE-2017-9605.html
https://linux.oracle.com/errata/ELSA-2020-5962.html
https://nvd.nist.gov/vuln/detail/CVE-2017-9605
https://ubuntu.com/security/notices/USN-3358-1
https://ubuntu.com/security/notices/USN-3359-1
https://ubuntu.com/security/notices/USN-3360-1
https://ubuntu.com/security/notices/USN-3360-2
https://ubuntu.com/security/notices/USN-3364-1
https://ubuntu.com/security/notices/USN-3364-2
https://ubuntu.com/security/notices/USN-3364-3
https://ubuntu.com/security/notices/USN-3371-1
https://www.cve.org/CVERecord?id=CVE-2017-9605
|
| kernel-headers |
CVE-2018-1108 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/104055
https://access.redhat.com/security/cve/CVE-2018-1108
https://bugs.chromium.org/p/project-zero/issues/detail?id=1559
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1108
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43838a23a05fbd13e47d750d3dfd77001536dd33
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8ef35c866f8862df074a49a93b0309725812dea8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dc12baacb95f205948f64dc936a47d89ee110117
https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1108
https://ubuntu.com/security/notices/USN-3752-1
https://ubuntu.com/security/notices/USN-3752-2
https://ubuntu.com/security/notices/USN-3752-3
https://usn.ubuntu.com/3718-1/
https://usn.ubuntu.com/3718-2/
https://usn.ubuntu.com/3752-1/
https://usn.ubuntu.com/3752-2/
https://usn.ubuntu.com/3752-3/
https://www.cve.org/CVERecord?id=CVE-2018-1108
https://www.debian.org/security/2018/dsa-4188
|
| kernel-headers |
CVE-2018-14609 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/104917
https://access.redhat.com/security/cve/CVE-2018-14609
https://bugzilla.kernel.org/show_bug.cgi?id=199833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14609
https://linux.oracle.com/cve/CVE-2018-14609.html
https://linux.oracle.com/errata/ELSA-2019-4570.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2018-14609
https://patchwork.kernel.org/patch/10500521/
https://ubuntu.com/security/notices/USN-3821-1
https://ubuntu.com/security/notices/USN-3821-2
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/3821-1/
https://usn.ubuntu.com/3821-2/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4118-1/
https://www.cve.org/CVERecord?id=CVE-2018-14609
https://www.debian.org/security/2018/dsa-4308
|
| kernel-headers |
CVE-2018-14612 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/104917
https://access.redhat.com/security/cve/CVE-2018-14612
https://bugzilla.kernel.org/show_bug.cgi?id=199847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14612
https://linux.oracle.com/cve/CVE-2018-14612.html
https://linux.oracle.com/errata/ELSA-2019-4570.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2018-14612
https://patchwork.kernel.org/patch/10503403/
https://patchwork.kernel.org/patch/10503413/
https://ubuntu.com/security/notices/USN-3932-1
https://ubuntu.com/security/notices/USN-3932-2
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/3932-1/
https://usn.ubuntu.com/3932-2/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4118-1/
https://www.cve.org/CVERecord?id=CVE-2018-14612
|
| kernel-headers |
CVE-2018-14613 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/104917
https://access.redhat.com/security/cve/CVE-2018-14613
https://bugzilla.kernel.org/show_bug.cgi?id=199849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14613
https://linux.oracle.com/cve/CVE-2018-14613.html
https://linux.oracle.com/errata/ELSA-2020-5845.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2018-14613
https://patchwork.kernel.org/patch/10503147/
https://ubuntu.com/security/notices/USN-3932-1
https://ubuntu.com/security/notices/USN-3932-2
https://ubuntu.com/security/notices/USN-4094-1
https://ubuntu.com/security/notices/USN-4118-1
https://usn.ubuntu.com/3932-1/
https://usn.ubuntu.com/3932-2/
https://usn.ubuntu.com/4094-1/
https://usn.ubuntu.com/4118-1/
https://www.cve.org/CVERecord?id=CVE-2018-14613
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers |
CVE-2018-18710 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
http://www.securityfocus.com/bid/106041
https://access.redhat.com/security/cve/CVE-2018-18710
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18710
https://git.kernel.org/linus/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
https://linux.oracle.com/cve/CVE-2018-18710.html
https://linux.oracle.com/errata/ELSA-2019-4316.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2018-18710
https://ubuntu.com/security/notices/USN-3846-1
https://ubuntu.com/security/notices/USN-3847-1
https://ubuntu.com/security/notices/USN-3847-2
https://ubuntu.com/security/notices/USN-3847-3
https://ubuntu.com/security/notices/USN-3848-1
https://ubuntu.com/security/notices/USN-3848-2
https://ubuntu.com/security/notices/USN-3849-1
https://ubuntu.com/security/notices/USN-3849-2
https://usn.ubuntu.com/3846-1/
https://usn.ubuntu.com/3847-1/
https://usn.ubuntu.com/3847-2/
https://usn.ubuntu.com/3847-3/
https://usn.ubuntu.com/3848-1/
https://usn.ubuntu.com/3848-2/
https://usn.ubuntu.com/3849-1/
https://usn.ubuntu.com/3849-2/
https://www.cve.org/CVERecord?id=CVE-2018-18710
|
| kernel-headers |
CVE-2018-7273 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.securityfocus.com/bid/103088
https://access.redhat.com/security/cve/CVE-2018-7273
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7273
https://lkml.org/lkml/2018/2/20/669
https://nvd.nist.gov/vuln/detail/CVE-2018-7273
https://www.cve.org/CVERecord?id=CVE-2018-7273
https://www.exploit-db.com/exploits/44325/
|
| kernel-headers |
CVE-2019-12380 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
http://www.securityfocus.com/bid/108477
https://access.redhat.com/security/cve/CVE-2019-12380
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e
https://linux.oracle.com/cve/CVE-2019-12380.html
https://linux.oracle.com/errata/ELSA-2020-5913.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
https://nvd.nist.gov/vuln/detail/CVE-2019-12380
https://security.netapp.com/advisory/ntap-20190710-0002/
https://ubuntu.com/security/notices/USN-4414-1
https://ubuntu.com/security/notices/USN-4427-1
https://ubuntu.com/security/notices/USN-4439-1
https://usn.ubuntu.com/4414-1/
https://usn.ubuntu.com/4427-1/
https://usn.ubuntu.com/4439-1/
https://www.cve.org/CVERecord?id=CVE-2019-12380
|
| kernel-headers |
CVE-2019-15099 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2019-15099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15099
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=bfd6e6e6c5d2ee43a3d9902b36e01fc7527ebb27
https://linux.oracle.com/cve/CVE-2019-15099.html
https://linux.oracle.com/errata/ELSA-2020-1769.html
https://lore.kernel.org/linux-wireless/20190804003101.11541-1-benquike%40gmail.com/T/#u
https://lore.kernel.org/linux-wireless/20191018133516.12606-1-linux@roeck-us.net/
https://nvd.nist.gov/vuln/detail/CVE-2019-15099
https://security.netapp.com/advisory/ntap-20190905-0002/
https://support.f5.com/csp/article/K76295179
https://support.f5.com/csp/article/K76295179?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.cve.org/CVERecord?id=CVE-2019-15099
|
| kernel-headers |
CVE-2019-15218 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
http://www.openwall.com/lists/oss-security/2019/08/22/2
http://www.openwall.com/lists/oss-security/2019/08/22/3
http://www.openwall.com/lists/oss-security/2019/08/22/4
http://www.openwall.com/lists/oss-security/2019/08/22/5
https://access.redhat.com/security/cve/CVE-2019-15218
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15218
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=31e0456de5be379b10fea0fa94a681057114a96e
https://linux.oracle.com/cve/CVE-2019-15218.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15218
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=4a5d7c8c2b6dbedb5b7218c6d7e8666bd2387517
https://ubuntu.com/security/notices/USN-4115-1
https://ubuntu.com/security/notices/USN-4118-1
https://ubuntu.com/security/notices/USN-4147-1
https://usn.ubuntu.com/4115-1/
https://usn.ubuntu.com/4118-1/
https://usn.ubuntu.com/4147-1/
https://www.cve.org/CVERecord?id=CVE-2019-15218
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers |
CVE-2019-15219 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
http://www.openwall.com/lists/oss-security/2019/08/22/2
http://www.openwall.com/lists/oss-security/2019/08/22/3
http://www.openwall.com/lists/oss-security/2019/08/22/4
http://www.openwall.com/lists/oss-security/2019/08/22/5
https://access.redhat.com/security/cve/CVE-2019-15219
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15219
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a5729f68d3a82786aea110b1bfe610be318f80a
https://linux.oracle.com/cve/CVE-2019-15219.html
https://linux.oracle.com/errata/ELSA-2019-4878.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15219
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=aaf6794922521df1c35c81e32cb2d0bb6a351e7b
https://www.cve.org/CVERecord?id=CVE-2019-15219
|
| kernel-headers |
CVE-2019-15291 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.openwall.com/lists/oss-security/2019/08/20/2
http://www.openwall.com/lists/oss-security/2019/08/22/1
https://access.redhat.com/security/cve/CVE-2019-15291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15291
https://linux.oracle.com/cve/CVE-2019-15291.html
https://linux.oracle.com/errata/ELSA-2020-5569.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15291
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20190905-0002/
https://syzkaller.appspot.com/bug?id=c0203bd72037d07493f4b7562411e4f5f4553a8f
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.cve.org/CVERecord?id=CVE-2019-15291
https://www.openwall.com/lists/oss-security/2019/08/20/2
|
| kernel-headers |
CVE-2019-15921 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2019-15921
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15921
https://git.kernel.org/linus/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2
https://nvd.nist.gov/vuln/detail/CVE-2019-15921
https://security.netapp.com/advisory/ntap-20191004-0001/
https://www.cve.org/CVERecord?id=CVE-2019-15921
|
| kernel-headers |
CVE-2019-15924 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://access.redhat.com/security/cve/CVE-2019-15924
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15924
https://git.kernel.org/linus/01ca667133d019edc9f0a1f70a272447c84ec41f
https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html
https://nvd.nist.gov/vuln/detail/CVE-2019-15924
https://security.netapp.com/advisory/ntap-20191004-0001/
https://www.cve.org/CVERecord?id=CVE-2019-15924
|
| kernel-headers |
CVE-2019-16229 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2019-16229
https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229
https://lkml.org/lkml/2019/9/9/487
https://nvd.nist.gov/vuln/detail/CVE-2019-16229
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.cve.org/CVERecord?id=CVE-2019-16229
|
| kernel-headers |
CVE-2019-16230 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2019-16230
https://bugzilla.suse.com/show_bug.cgi?id=1150468
https://lkml.org/lkml/2019/9/9/487
https://nvd.nist.gov/vuln/detail/CVE-2019-16230
https://security.netapp.com/advisory/ntap-20191004-0001/
https://www.cve.org/CVERecord?id=CVE-2019-16230
|
| kernel-headers |
CVE-2019-16234 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html
https://access.redhat.com/security/cve/CVE-2019-16234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234
https://linux.oracle.com/cve/CVE-2019-16234.html
https://linux.oracle.com/errata/ELSA-2020-5804.html
https://lkml.org/lkml/2019/9/9/487
https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2019-16234
https://security.netapp.com/advisory/ntap-20191004-0001/
https://ubuntu.com/security/notices/USN-4342-1
https://ubuntu.com/security/notices/USN-4344-1
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4346-1
https://usn.ubuntu.com/4342-1/
https://usn.ubuntu.com/4344-1/
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4346-1/
https://www.cve.org/CVERecord?id=CVE-2019-16234
|
| kernel-headers |
CVE-2019-18806 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2019-18806
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18806
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1acb8f2a7a9f10543868ddd737e37424d5c36cf4
https://git.kernel.org/linus/1acb8f2a7a9f10543868ddd737e37424d5c36cf4
https://linux.oracle.com/cve/CVE-2019-18806.html
https://linux.oracle.com/errata/ELSA-2020-5649.html
https://nvd.nist.gov/vuln/detail/CVE-2019-18806
https://www.cve.org/CVERecord?id=CVE-2019-18806
|
| kernel-headers |
CVE-2019-18885 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
https://access.redhat.com/security/cve/CVE-2019-18885
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18885
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ba3bc9dd150457c506e4661380a6183af651c1
https://github.com/bobfuzzer/CVE-2019-18885
https://github.com/torvalds/linux/commit/09ba3bc9dd150457c506e4661380a6183af651c1
https://linux.oracle.com/cve/CVE-2019-18885.html
https://linux.oracle.com/errata/ELSA-2020-5885.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html
https://nvd.nist.gov/vuln/detail/CVE-2019-18885
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.cve.org/CVERecord?id=CVE-2019-18885
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers |
CVE-2019-19039 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2019-19039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19039
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039
https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html
https://nvd.nist.gov/vuln/detail/CVE-2019-19039
https://ubuntu.com/security/notices/USN-4414-1
https://usn.ubuntu.com/4414-1/
https://www.cve.org/CVERecord?id=CVE-2019-19039
|
| kernel-headers |
CVE-2019-19054 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054
https://github.com/torvalds/linux/commit/a7b2df76b42bdd026e3106cf2ba97db41345a177
https://linux.oracle.com/cve/CVE-2019-19054.html
https://linux.oracle.com/errata/ELSA-2020-5878.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://nvd.nist.gov/vuln/detail/CVE-2019-19054
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4525-1
https://ubuntu.com/security/notices/USN-4526-1
https://ubuntu.com/security/notices/USN-4527-1
https://usn.ubuntu.com/4525-1/
https://usn.ubuntu.com/4526-1/
https://usn.ubuntu.com/4527-1/
https://www.cve.org/CVERecord?id=CVE-2019-19054
|
| kernel-headers |
CVE-2019-19056 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056
https://github.com/torvalds/linux/commit/db8fd2cde93227e566a412cf53173ffa227998bc
https://linux.oracle.com/cve/CVE-2019-19056.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://nvd.nist.gov/vuln/detail/CVE-2019-19056
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4300-1
https://ubuntu.com/security/notices/USN-4301-1
https://ubuntu.com/security/notices/USN-4302-1
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4300-1/
https://usn.ubuntu.com/4301-1/
https://usn.ubuntu.com/4302-1/
https://www.cve.org/CVERecord?id=CVE-2019-19056
|
| kernel-headers |
CVE-2019-19057 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
https://access.redhat.com/security/cve/CVE-2019-19057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19057
https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050c
https://linux.oracle.com/cve/CVE-2019-19057.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://nvd.nist.gov/vuln/detail/CVE-2019-19057
https://seclists.org/bugtraq/2020/Jan/10
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4254-1
https://ubuntu.com/security/notices/USN-4254-2
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4254-1/
https://usn.ubuntu.com/4254-2/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.cve.org/CVERecord?id=CVE-2019-19057
|
| kernel-headers |
CVE-2019-19065 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19065
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19065
https://github.com/torvalds/linux/commit/34b3be18a04ecdc610aae4c48e5d1b799d8689f6
https://nvd.nist.gov/vuln/detail/CVE-2019-19065
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4210-1
https://ubuntu.com/security/notices/USN-4226-1
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4210-1/
https://usn.ubuntu.com/4226-1/
https://www.cve.org/CVERecord?id=CVE-2019-19065
|
| kernel-headers |
CVE-2019-19066 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19066
https://github.com/torvalds/linux/commit/0e62395da2bd5166d7c9e14cbc7503b256a34cb0
https://linux.oracle.com/cve/CVE-2019-19066.html
https://linux.oracle.com/errata/ELSA-2021-9473.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://nvd.nist.gov/vuln/detail/CVE-2019-19066
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4300-1
https://ubuntu.com/security/notices/USN-4301-1
https://ubuntu.com/security/notices/USN-4302-1
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4300-1/
https://usn.ubuntu.com/4301-1/
https://usn.ubuntu.com/4302-1/
https://www.cve.org/CVERecord?id=CVE-2019-19066
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers |
CVE-2019-19073 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19073
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073
https://github.com/torvalds/linux/commit/853acf7caf10b828102d92d05b5c101666a6142b
https://linux.oracle.com/cve/CVE-2019-19073.html
https://linux.oracle.com/errata/ELSA-2020-5881.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://nvd.nist.gov/vuln/detail/CVE-2019-19073
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4526-1
https://ubuntu.com/security/notices/USN-4527-1
https://usn.ubuntu.com/4526-1/
https://usn.ubuntu.com/4527-1/
https://www.cve.org/CVERecord?id=CVE-2019-19073
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers |
CVE-2019-19074 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19074
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074
https://github.com/torvalds/linux/commit/728c1e2a05e4b5fc52fab3421dce772a806612a2
https://linux.oracle.com/cve/CVE-2019-19074.html
https://linux.oracle.com/errata/ELSA-2021-9473.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
https://nvd.nist.gov/vuln/detail/CVE-2019-19074
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4526-1
https://ubuntu.com/security/notices/USN-4527-1
https://usn.ubuntu.com/4526-1/
https://usn.ubuntu.com/4527-1/
https://www.cve.org/CVERecord?id=CVE-2019-19074
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers |
CVE-2019-19080 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19080
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19080
https://github.com/torvalds/linux/commit/8572cea1461a006bce1d06c0c4b0575869125fa4
https://nvd.nist.gov/vuln/detail/CVE-2019-19080
https://security.netapp.com/advisory/ntap-20191205-0001/
https://www.cve.org/CVERecord?id=CVE-2019-19080
|
| kernel-headers |
CVE-2019-19081 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19081
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19081
https://github.com/torvalds/linux/commit/8ce39eb5a67aee25d9f05b40b673c95b23502e3e
https://nvd.nist.gov/vuln/detail/CVE-2019-19081
https://security.netapp.com/advisory/ntap-20191205-0001/
https://www.cve.org/CVERecord?id=CVE-2019-19081
|
| kernel-headers |
CVE-2019-19082 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19082
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19082
https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
https://nvd.nist.gov/vuln/detail/CVE-2019-19082
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4258-1
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4258-1/
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.cve.org/CVERecord?id=CVE-2019-19082
|
| kernel-headers |
CVE-2019-19083 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
https://access.redhat.com/security/cve/CVE-2019-19083
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083
https://github.com/torvalds/linux/commit/055e547478a11a6360c7ce05e2afc3e366968a12
https://nvd.nist.gov/vuln/detail/CVE-2019-19083
https://security.netapp.com/advisory/ntap-20191205-0001/
https://ubuntu.com/security/notices/USN-4208-1
https://ubuntu.com/security/notices/USN-4226-1
https://ubuntu.com/security/notices/USN-4227-1
https://ubuntu.com/security/notices/USN-4227-2
https://usn.ubuntu.com/4208-1/
https://usn.ubuntu.com/4226-1/
https://usn.ubuntu.com/4227-1/
https://usn.ubuntu.com/4227-2/
https://www.cve.org/CVERecord?id=CVE-2019-19083
|
| kernel-headers |
CVE-2019-19378 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2019-19378
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378
https://nvd.nist.gov/vuln/detail/CVE-2019-19378
https://security.netapp.com/advisory/ntap-20200103-0001/
https://www.cve.org/CVERecord?id=CVE-2019-19378
|
| kernel-headers |
CVE-2019-19533 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://www.openwall.com/lists/oss-security/2019/12/03/4
https://access.redhat.com/security/cve/CVE-2019-19533
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19533
https://git.kernel.org/linus/a10feaf8c464c3f9cfdd3a8a7ce17e1c0d498da1
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a10feaf8c464c3f9cfdd3a8a7ce17e1c0d498da1
https://linux.oracle.com/cve/CVE-2019-19533.html
https://linux.oracle.com/errata/ELSA-2020-5755.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2019-19533
https://www.cve.org/CVERecord?id=CVE-2019-19533
|
| kernel-headers |
CVE-2019-19965 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
https://access.redhat.com/security/cve/CVE-2019-19965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19965
https://git.kernel.org/linus/f70267f379b5e5e11bdc5d72a56bf17e5feed01f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f70267f379b5e5e11bdc5d72a56bf17e5feed01f
https://linux.oracle.com/cve/CVE-2019-19965.html
https://linux.oracle.com/errata/ELSA-2020-5879.html
https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2019-19965
https://security.netapp.com/advisory/ntap-20200204-0002/
https://ubuntu.com/security/notices/USN-4284-1
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4284-1/
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.cve.org/CVERecord?id=CVE-2019-19965
|
| kernel-headers |
CVE-2019-20096 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html
https://access.redhat.com/security/cve/CVE-2019-20096
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20096
https://git.kernel.org/linus/1d3ff0950e2b40dc861b1739029649d03f591820
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1d3ff0950e2b40dc861b1739029649d03f591820
https://linux.oracle.com/cve/CVE-2019-20096.html
https://linux.oracle.com/errata/ELSA-2020-5866.html
https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2019-20096
https://ubuntu.com/security/notices/USN-4285-1
https://ubuntu.com/security/notices/USN-4286-1
https://ubuntu.com/security/notices/USN-4286-2
https://ubuntu.com/security/notices/USN-4287-1
https://ubuntu.com/security/notices/USN-4287-2
https://usn.ubuntu.com/4285-1/
https://usn.ubuntu.com/4286-1/
https://usn.ubuntu.com/4286-2/
https://usn.ubuntu.com/4287-1/
https://usn.ubuntu.com/4287-2/
https://www.cve.org/CVERecord?id=CVE-2019-20096
|
| kernel-headers |
CVE-2019-25162 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2019-25162
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://lore.kernel.org/linux-cve-announce/2024022602-CVE-2019-25162-70ae@gregkh/
https://nvd.nist.gov/vuln/detail/CVE-2019-25162
https://www.cve.org/CVERecord?id=CVE-2019-25162
|
| kernel-headers |
CVE-2020-10773 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-10773
https://bugzilla.redhat.com/show_bug.cgi?id=1846380
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10773
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10773
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f
https://linux.oracle.com/cve/CVE-2020-10773.html
https://linux.oracle.com/errata/ELSA-2020-4431.html
https://nvd.nist.gov/vuln/detail/CVE-2020-10773
https://www.cve.org/CVERecord?id=CVE-2020-10773
|
| kernel-headers |
CVE-2020-10781 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-10781
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10781
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=853eab68afc80f59f36bbdeb715e5c88c501e680
https://linux.oracle.com/cve/CVE-2020-10781.html
https://linux.oracle.com/errata/ELSA-2020-5885.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html
https://lore.kernel.org/linux-block/20200617103412.GA2027053@kroah.com/
https://nvd.nist.gov/vuln/detail/CVE-2020-10781
https://ubuntu.com/security/notices/USN-4483-1
https://ubuntu.com/security/notices/USN-4485-1
https://www.cve.org/CVERecord?id=CVE-2020-10781
https://www.openwall.com/lists/oss-security/2020/06/18/1
|
| kernel-headers |
CVE-2020-11608 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-11608
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30
https://git.kernel.org/linus/998912346c0da53a6dbb71fab3a138586b596b30
https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30
https://linux.oracle.com/cve/CVE-2020-11608.html
https://linux.oracle.com/errata/ELSA-2021-1578.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-11608
https://security.netapp.com/advisory/ntap-20200430-0004/
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4364-1
https://ubuntu.com/security/notices/USN-4368-1
https://ubuntu.com/security/notices/USN-4369-1
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4364-1/
https://usn.ubuntu.com/4368-1/
https://usn.ubuntu.com/4369-1/
https://www.cve.org/CVERecord?id=CVE-2020-11608
https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers |
CVE-2020-11609 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-11609
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=485b06aadb933190f4bc44e006076bc27a23f205
https://git.kernel.org/linus/485b06aadb933190f4bc44e006076bc27a23f205
https://github.com/torvalds/linux/commit/485b06aadb933190f4bc44e006076bc27a23f205
https://linux.oracle.com/cve/CVE-2020-11609.html
https://linux.oracle.com/errata/ELSA-2020-5715.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-11609
https://security.netapp.com/advisory/ntap-20200430-0004/
https://ubuntu.com/security/notices/USN-4345-1
https://ubuntu.com/security/notices/USN-4364-1
https://ubuntu.com/security/notices/USN-4368-1
https://ubuntu.com/security/notices/USN-4369-1
https://usn.ubuntu.com/4345-1/
https://usn.ubuntu.com/4364-1/
https://usn.ubuntu.com/4368-1/
https://usn.ubuntu.com/4369-1/
https://www.cve.org/CVERecord?id=CVE-2020-11609
https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers |
CVE-2020-12652 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-12652
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.14
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=28d76df18f0ad5bcf5fa48510b225f0ed262a99b
https://git.kernel.org/linus/28d76df18f0ad5bcf5fa48510b225f0ed262a99b (5.5-rc7)
https://github.com/torvalds/linux/commit/28d76df18f0ad5bcf5fa48510b225f0ed262a99b
https://linux.oracle.com/cve/CVE-2020-12652.html
https://linux.oracle.com/errata/ELSA-2021-9002.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://nvd.nist.gov/vuln/detail/CVE-2020-12652
https://security.netapp.com/advisory/ntap-20200608-0001/
https://www.cve.org/CVERecord?id=CVE-2020-12652
https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers |
CVE-2020-12655 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
https://access.redhat.com/security/cve/CVE-2020-12655
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12655
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d0c7feaf87678371c2c09b3709400be416b2dc62
https://git.kernel.org/linus/d0c7feaf87678371c2c09b3709400be416b2dc62 (5.7-rc1)
https://github.com/torvalds/linux/commit/d0c7feaf87678371c2c09b3709400be416b2dc62
https://linux.oracle.com/cve/CVE-2020-12655.html
https://linux.oracle.com/errata/ELSA-2022-9969.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ES5C6ZCMALBEBMKNNCTBSLLSYGFZG3FF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IO5XIQSRI747P4RVVTNX7TUPEOCF4OPU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZ2X3TM6RGRUS3KZAS26IJO5XGU7TBBR/
https://lore.kernel.org/linux-xfs/20200221153803.GP9506%40magnolia/
https://lore.kernel.org/linux-xfs/20200221153803.GP9506@magnolia/
https://nvd.nist.gov/vuln/detail/CVE-2020-12655
https://security.netapp.com/advisory/ntap-20200608-0001/
https://ubuntu.com/security/notices/USN-4465-1
https://ubuntu.com/security/notices/USN-4483-1
https://ubuntu.com/security/notices/USN-4485-1
https://ubuntu.com/security/notices/USN-5343-1
https://usn.ubuntu.com/4465-1/
https://usn.ubuntu.com/4483-1/
https://usn.ubuntu.com/4485-1/
https://www.cve.org/CVERecord?id=CVE-2020-12655
|
| kernel-headers |
CVE-2020-12656 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
https://access.redhat.com/security/cve/CVE-2020-12656
https://bugzilla.kernel.org/show_bug.cgi?id=206651
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12656
https://nvd.nist.gov/vuln/detail/CVE-2020-12656
https://ubuntu.com/security/notices/USN-4483-1
https://ubuntu.com/security/notices/USN-4485-1
https://usn.ubuntu.com/4483-1/
https://usn.ubuntu.com/4485-1/
https://www.cve.org/CVERecord?id=CVE-2020-12656
|
| kernel-headers |
CVE-2020-14304 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-14304
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304
https://linux.oracle.com/cve/CVE-2020-14304.html
https://linux.oracle.com/errata/ELSA-2021-9410.html
https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
https://nvd.nist.gov/vuln/detail/CVE-2020-14304
https://www.cve.org/CVERecord?id=CVE-2020-14304
|
| kernel-headers |
CVE-2020-14390 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html
https://access.redhat.com/security/cve/CVE-2020-14390
https://bugzilla.redhat.com/show_bug.cgi?id=1876788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390
https://git.kernel.org/linus/50145474f6ef4a9c19205b173da6264a644c7489
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50145474f6ef4a9c19205b173da6264a644c7489
https://linux.oracle.com/cve/CVE-2020-14390.html
https://linux.oracle.com/errata/ELSA-2022-9852.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14390
https://seclists.org/oss-sec/2020/q3/174
https://ubuntu.com/security/notices/USN-4657-1
https://ubuntu.com/security/notices/USN-4658-1
https://ubuntu.com/security/notices/USN-4660-1
https://ubuntu.com/security/notices/USN-4912-1
https://www.cve.org/CVERecord?id=CVE-2020-14390
https://www.openwall.com/lists/oss-security/2020/09/15/2
|
| kernel-headers |
CVE-2020-26146 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26146
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26146.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://nvd.nist.gov/vuln/detail/CVE-2020-26146
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.cve.org/CVERecord?id=CVE-2020-26146
https://www.fragattacks.com
|
| kernel-headers |
CVE-2020-26147 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://www.openwall.com/lists/oss-security/2021/05/11/12
https://access.redhat.com/security/cve/CVE-2020-26147
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md
https://linux.oracle.com/cve/CVE-2020-26147.html
https://linux.oracle.com/errata/ELSA-2021-9459.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/
https://nvd.nist.gov/vuln/detail/CVE-2020-26147
https://papers.mathyvanhoef.com/usenix2021.pdf
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu
https://ubuntu.com/security/notices/USN-4997-1
https://ubuntu.com/security/notices/USN-4997-2
https://ubuntu.com/security/notices/USN-4999-1
https://ubuntu.com/security/notices/USN-5000-1
https://ubuntu.com/security/notices/USN-5000-2
https://ubuntu.com/security/notices/USN-5001-1
https://ubuntu.com/security/notices/USN-5018-1
https://ubuntu.com/security/notices/USN-5299-1
https://ubuntu.com/security/notices/USN-5343-1
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63
https://www.cve.org/CVERecord?id=CVE-2020-26147
https://www.fragattacks.com
|
| kernel-headers |
CVE-2020-27820 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-0404.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13974.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27820.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-4788.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0941.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26401.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-29154.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37159.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3743.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3744.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3759.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3764.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4037.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4083.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4157.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41864.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4197.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4203.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42739.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43056.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43389.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43976.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44733.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45485.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45486.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0001.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0002.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0286.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0322.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1011.json
https://access.redhat.com/security/cve/CVE-2020-27820
https://bugzilla.redhat.com/show_bug.cgi?id=1901726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820
https://errata.almalinux.org/8/ALSA-2022-1988.html
https://linux.oracle.com/cve/CVE-2020-27820.html
https://linux.oracle.com/errata/ELSA-2022-1988.html
https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline%40redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline%40redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline%40redhat.com/
https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/
https://lore.kernel.org/dri-devel/20201125202648.5220-1-jcline@redhat.com/
https://nvd.nist.gov/vuln/detail/CVE-2020-27820
https://ubuntu.com/security/notices/USN-5265-1
https://ubuntu.com/security/notices/USN-5278-1
https://ubuntu.com/security/notices/USN-5413-1
https://ubuntu.com/security/notices/USN-5415-1
https://www.cve.org/CVERecord?id=CVE-2020-27820
https://www.oracle.com/security-alerts/cpujul2022.html
|
| kernel-headers |
CVE-2020-29660 |
LOW |
3.10.0-1160.108.1.el7 |
|
http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
http://www.openwall.com/lists/oss-security/2020/12/10/1
https://access.redhat.com/security/cve/CVE-2020-29660
https://bugs.chromium.org/p/project-zero/issues/detail?id=2125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660
https://git.kernel.org/linus/c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
https://linux.oracle.com/cve/CVE-2020-29660.html
https://linux.oracle.com/errata/ELSA-2021-9039.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/
https://nvd.nist.gov/vuln/detail/CVE-2020-29660
https://security.netapp.com/advisory/ntap-20210122-0001/
https://ubuntu.com/security/notices/USN-4748-1
https://ubuntu.com/security/notices/USN-4749-1
https://ubuntu.com/security/notices/USN-4750-1
https://ubuntu.com/security/notices/USN-4751-1
https://ubuntu.com/security/notices/USN-4752-1
https://ubuntu.com/security/notices/USN-5130-1
https://www.cve.org/CVERecord?id=CVE-2020-29660
https://www.debian.org/security/2021/dsa-4843
|
| kernel-headers |
CVE-2020-35501 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-35501
https://bugzilla.redhat.com/show_bug.cgi?id=1908577
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501
https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html
https://nvd.nist.gov/vuln/detail/CVE-2020-35501
https://www.cve.org/CVERecord?id=CVE-2020-35501
https://www.openwall.com/lists/oss-security/2021/02/18/1
|
| kernel-headers |
CVE-2020-36777 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-36777
https://git.kernel.org/stable/c/06854b943e0571ccbd7ad0a529babed1a98ff275
https://git.kernel.org/stable/c/32168ca1f123316848fffb85d059860adf3c409f
https://git.kernel.org/stable/c/43263fd43083e412311fa764cd04a727b0c6a749
https://git.kernel.org/stable/c/9185b3b1c143b8da409c19ac5a785aa18d67a81b
https://git.kernel.org/stable/c/9ad15e214fcd73694ea51967d86055f47b802066
https://git.kernel.org/stable/c/bf9a40ae8d722f281a2721779595d6df1c33a0bf
https://git.kernel.org/stable/c/cd89f79be5d553c78202f686e8e4caa5fbe94e98
https://git.kernel.org/stable/c/cede24d13be6c2a62be6d7ceea63c2719b0cfa82
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-2-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-36777
https://www.cve.org/CVERecord?id=CVE-2020-36777
|
| kernel-headers |
CVE-2020-36778 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-36778
https://git.kernel.org/stable/c/a42ac16e6573f19c78f556ea292f5b534fcc4514
https://git.kernel.org/stable/c/a85c5c7a3aa8041777ff691400b4046e56149fd3
https://git.kernel.org/stable/c/c977426db644ba476938125597947979e8aba725
https://git.kernel.org/stable/c/e2ba996577eaea423694dc69ae43d56f1410a22b
https://lore.kernel.org/linux-cve-announce/2024022817-CVE-2020-36778-48a5@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-36778
https://www.cve.org/CVERecord?id=CVE-2020-36778
|
| kernel-headers |
CVE-2020-36779 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-36779
https://git.kernel.org/stable/c/2c662660ce2bd3b09dae21a9a9ac9395e1e6c00b
https://git.kernel.org/stable/c/c323b270a52a26aa8038a4d1fd9a850904a41166
https://git.kernel.org/stable/c/c7ea772c9fcf711ed566814b92eecaffc0e2bfd0
https://git.kernel.org/stable/c/d791b90f5c5e5aa8ccf9e33386c16bd2b7e333a4
https://lore.kernel.org/linux-cve-announce/2024022819-CVE-2020-36779-9f1e@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-36779
https://www.cve.org/CVERecord?id=CVE-2020-36779
|
| kernel-headers |
CVE-2020-36780 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-36780
https://git.kernel.org/stable/c/3a4f326463117cee3adcb72999ca34a9aaafda93
https://git.kernel.org/stable/c/7e1764312440c5df9dfe6b436035a03673b0c1b9
https://git.kernel.org/stable/c/9223505e938ba3db5907e058f4209770cff2f2a7
https://git.kernel.org/stable/c/d3406ab52097328a3bc4cbe124bfd8f6d51fb86f
https://git.kernel.org/stable/c/e547640cee7981fd751d2c9cde3a61bdb678b755
https://lore.kernel.org/linux-cve-announce/2024022820-CVE-2020-36780-9637@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-36780
https://www.cve.org/CVERecord?id=CVE-2020-36780
|
| kernel-headers |
CVE-2020-36781 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-36781
https://git.kernel.org/stable/c/1ecc0ebc2ebbad4a22a670a07d27a21fa0b59c77
https://git.kernel.org/stable/c/3a0cdd336d92c429b51a79bf4f64b17eafa0325d
https://git.kernel.org/stable/c/47ff617217ca6a13194fcb35c6c3a0c57c080693
https://git.kernel.org/stable/c/ff406f6cd09c273337ab4854292e4aca48f8affd
https://lore.kernel.org/linux-cve-announce/2024022820-CVE-2020-36781-d70c@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-36781
https://www.cve.org/CVERecord?id=CVE-2020-36781
|
| kernel-headers |
CVE-2020-36782 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-36782
https://git.kernel.org/stable/c/278e5bbdb9a94fa063c0f9bcde2479d0b8042462
https://git.kernel.org/stable/c/815859cb1d2302e74f11bf6894bceace9ca9eb4a
https://git.kernel.org/stable/c/b100650d80cd2292f6c152f5f2943b5944b3e8ce
https://git.kernel.org/stable/c/bb300acc867e937edc2a6898e92b21f88e4e4e66
https://git.kernel.org/stable/c/cc49d206414240483bb93ffa3d80243e6a776916
https://lore.kernel.org/linux-cve-announce/2024022820-CVE-2020-36782-e7d8@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-36782
https://www.cve.org/CVERecord?id=CVE-2020-36782
|
| kernel-headers |
CVE-2020-36783 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-36783
https://git.kernel.org/stable/c/223125e37af8a641ea4a09747a6a52172fc4b903
https://git.kernel.org/stable/c/4734c4b1d9573c9d20bbc46cf37dde095ee011b8
https://git.kernel.org/stable/c/7ee35cde1e810ad6ca589980b9ec2b7b62946a5b
https://git.kernel.org/stable/c/96c4a03658d661666c360959aa80cdabfe2972ed
https://git.kernel.org/stable/c/e80ae8bde41266d3b8bf012460b6593851766006
https://lore.kernel.org/linux-cve-announce/2024022820-CVE-2020-36783-8372@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-36783
https://www.cve.org/CVERecord?id=CVE-2020-36783
|
| kernel-headers |
CVE-2020-36784 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-36784
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://lore.kernel.org/linux-cve-announce/2024022821-CVE-2020-36784-a266@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-36784
https://www.cve.org/CVERecord?id=CVE-2020-36784
|
| kernel-headers |
CVE-2020-36785 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-36785
https://git.kernel.org/stable/c/801c1d505894008c888bc71d08d5cff5d87f8aba
https://git.kernel.org/stable/c/8267ccd7b9df7ab682043507dd682fe0621cf045
https://git.kernel.org/stable/c/ba11bbf303fafb33989e95473e409f6ab412b18d
https://git.kernel.org/stable/c/d218c7a0284f6b92a7b82d2e19706e18663b4193
https://lore.kernel.org/linux-cve-announce/2024022821-CVE-2020-36785-96c7@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-36785
https://www.cve.org/CVERecord?id=CVE-2020-36785
|
| kernel-headers |
CVE-2020-36786 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-36786
https://git.kernel.org/stable/c/27d2eab69f7da8e94e4751ac5c6d22d809275484
https://git.kernel.org/stable/c/4f0f37d03cde8f4341df8454f9b40a67fda94a33
https://git.kernel.org/stable/c/6045b01dd0e3cd3759eafe7f290ed04c957500b1
https://git.kernel.org/stable/c/cc4cc2fb5aaf9adb83c02211eb13b16cfcb7ba64
https://lore.kernel.org/linux-cve-announce/2024022821-CVE-2020-36786-fa2b@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2020-36786
https://www.cve.org/CVERecord?id=CVE-2020-36786
|
| kernel-headers |
CVE-2021-20320 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-20320
https://bugzilla.redhat.com/show_bug.cgi?id=2010090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320
https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh%40anyfinetworks.com/
https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/
https://nvd.nist.gov/vuln/detail/CVE-2021-20320
https://www.cve.org/CVERecord?id=CVE-2021-20320
|
| kernel-headers |
CVE-2021-31916 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-31916
https://bugzilla.redhat.com/show_bug.cgi?id=1946965
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31916
https://git.kernel.org/linus/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a
https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a
https://linux.oracle.com/cve/CVE-2021-31916.html
https://linux.oracle.com/errata/ELSA-2021-9346.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2021-31916
https://seclists.org/oss-sec/2021/q1/268
https://ubuntu.com/security/notices/USN-4948-1
https://ubuntu.com/security/notices/USN-4979-1
https://ubuntu.com/security/notices/USN-4982-1
https://ubuntu.com/security/notices/USN-4984-1
https://ubuntu.com/security/notices/USN-5361-1
https://www.cve.org/CVERecord?id=CVE-2021-31916
https://www.openwall.com/lists/oss-security/2021/03/28/1
|
| kernel-headers |
CVE-2021-3635 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json
https://access.redhat.com/security/cve/CVE-2021-3635
https://bugzilla.redhat.com/show_bug.cgi?id=1976946
https://linux.oracle.com/cve/CVE-2021-3635.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3635
https://www.cve.org/CVERecord?id=CVE-2021-3635
|
| kernel-headers |
CVE-2021-3659 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-3659
https://bugzilla.redhat.com/show_bug.cgi?id=1975949
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3659
https://git.kernel.org/linus/1165affd484889d4986cf3b724318935a0b120d8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8
https://linux.oracle.com/cve/CVE-2021-3659.html
https://linux.oracle.com/errata/ELSA-2021-4356.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3659
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2021-3659
|
| kernel-headers |
CVE-2021-38198 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-38198
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198
https://github.com/torvalds/linux/commit/b1bd5cba3306691c771d558e94baa73e8b0b96b7
https://linux.oracle.com/cve/CVE-2021-38198.html
https://linux.oracle.com/errata/ELSA-2021-9475.html
https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html
https://nvd.nist.gov/vuln/detail/CVE-2021-38198
https://ubuntu.com/security/notices/USN-5070-1
https://ubuntu.com/security/notices/USN-5114-1
https://ubuntu.com/security/notices/USN-5116-1
https://ubuntu.com/security/notices/USN-5116-2
https://ubuntu.com/security/notices/USN-5343-1
https://www.cve.org/CVERecord?id=CVE-2021-38198
|
| kernel-headers |
CVE-2021-3923 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-3923
https://bugzilla.redhat.com/show_bug.cgi?id=2019643
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3923
https://git.kernel.org/linus/b35a0f4dd544eaa6162b6d2f13a2557a121ae5fd
https://lore.kernel.org/all/20220204100036.GA12348%40kili/
https://nvd.nist.gov/vuln/detail/CVE-2021-3923
https://www.cve.org/CVERecord?id=CVE-2021-3923
|
| kernel-headers |
CVE-2021-46911 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46911
https://git.kernel.org/stable/c/1a73e427b824133940c2dd95ebe26b6dce1cbf10
https://git.kernel.org/stable/c/8348665d4181c68b0ca1205b48e1753d78bc810f
https://git.kernel.org/stable/c/8d5a9dbd2116a852f8f0f91f6fbc42a0afe1091f
https://nvd.nist.gov/vuln/detail/CVE-2021-46911
https://www.cve.org/CVERecord?id=CVE-2021-46911
|
| kernel-headers |
CVE-2021-46914 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46914
https://git.kernel.org/stable/c/be07581aacae7cd0a073afae8e8862032f794309
https://git.kernel.org/stable/c/debb9df311582c83fe369baa35fa4b92e8a9c58a
https://git.kernel.org/stable/c/f1b4be4a753caa4056496f679d70550d0c11a264
https://nvd.nist.gov/vuln/detail/CVE-2021-46914
https://www.cve.org/CVERecord?id=CVE-2021-46914
|
| kernel-headers |
CVE-2021-46922 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46922
https://git.kernel.org/stable/c/39c8d760d44cb3fa0d67e8cd505df81cf4d80999
https://git.kernel.org/stable/c/bf84ef2dd2ccdcd8f2658476d34b51455f970ce4
https://lore.kernel.org/linux-cve-announce/2024022736-CVE-2021-46922-39b5@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46922
https://www.cve.org/CVERecord?id=CVE-2021-46922
|
| kernel-headers |
CVE-2021-46923 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46923
https://git.kernel.org/stable/c/012e332286e2bb9f6ac77d195f17e74b2963d663
https://git.kernel.org/stable/c/47b5d0a7532d39e42a938f81e3904268145c341d
https://lore.kernel.org/linux-cve-announce/2024022745-CVE-2021-46923-a1ec@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46923
https://www.cve.org/CVERecord?id=CVE-2021-46923
|
| kernel-headers |
CVE-2021-46924 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46924
https://git.kernel.org/stable/c/1b9dadba502234eea7244879b8d5d126bfaf9f0c
https://git.kernel.org/stable/c/1cd4063dbc91cf7965d73a6a3855e2028cd4613b
https://git.kernel.org/stable/c/238920381b8925d070d32d73cd9ce52ab29896fe
https://git.kernel.org/stable/c/38c3e320e7ff46f2dc67bc5045333e63d9f8918d
https://git.kernel.org/stable/c/a1e0080a35a16ce3808f7040fe0c3a8fdb052349
https://git.kernel.org/stable/c/e553265ea56482da5700f56319fda9ff53e7dcb4
https://lore.kernel.org/linux-cve-announce/2024022748-CVE-2021-46924-3483@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46924
https://www.cve.org/CVERecord?id=CVE-2021-46924
|
| kernel-headers |
CVE-2021-46926 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46926
https://git.kernel.org/stable/c/385f287f9853da402d94278e59f594501c1d1dad
https://git.kernel.org/stable/c/cce476954401e3421afafb25bbaa926050688b1d
https://lore.kernel.org/linux-cve-announce/2024022748-CVE-2021-46926-9967@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46926
https://www.cve.org/CVERecord?id=CVE-2021-46926
|
| kernel-headers |
CVE-2021-46927 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46927
https://git.kernel.org/stable/c/3a0152b219523227c2a62a0a122cf99608287176
https://git.kernel.org/stable/c/90d2beed5e753805c5eab656b8d48257638fe543
https://lore.kernel.org/linux-cve-announce/2024022749-CVE-2021-46927-ae70@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46927
https://www.cve.org/CVERecord?id=CVE-2021-46927
|
| kernel-headers |
CVE-2021-46931 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46931
https://git.kernel.org/stable/c/07f13d58a8ecc3baf9a488588fb38c5cb0db484f
https://git.kernel.org/stable/c/73665165b64a8f3c5b3534009a69be55bb744f05
https://git.kernel.org/stable/c/918fc3855a6507a200e9cf22c20be852c0982687
https://lore.kernel.org/linux-cve-announce/2024022750-CVE-2021-46931-a468@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46931
https://www.cve.org/CVERecord?id=CVE-2021-46931
|
| kernel-headers |
CVE-2021-46933 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46933
https://git.kernel.org/stable/c/1c4ace3e6b8575745c50dca9e76e0021e697d645
https://git.kernel.org/stable/c/240fc586e83d645912accce081a48aa63a45f6ee
https://git.kernel.org/stable/c/33f6a0cbb7772146e1c11f38028fffbfed14728b
https://git.kernel.org/stable/c/52500239e3f2d6fc77b6f58632a9fb98fe74ac09
https://git.kernel.org/stable/c/b1e0887379422975f237d43d8839b751a6bcf154
https://git.kernel.org/stable/c/cc8c8028c21b2a3842a1e98e99e55028df275919
https://git.kernel.org/stable/c/ebef2aa29f370b5096c16020c104e393192ef684
https://git.kernel.org/stable/c/f976dd7011150244a7ba820f2c331e9fb253befa
https://lore.kernel.org/linux-cve-announce/2024022750-CVE-2021-46933-2103@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46933
https://www.cve.org/CVERecord?id=CVE-2021-46933
|
| kernel-headers |
CVE-2021-46934 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46934
https://git.kernel.org/stable/c/407c8708fb1bf2d4afc5337ef50635cf540c364b
https://git.kernel.org/stable/c/8d31cbab4c295d7010ebb729e9d02d0e9cece18f
https://git.kernel.org/stable/c/9e4a3f47eff476097e0c7faac04d1831fc70237d
https://git.kernel.org/stable/c/bb436283e25aaf1533ce061605d23a9564447bdf
https://git.kernel.org/stable/c/f68599581067e8a5a8901ba9eb270b4519690e26
https://lore.kernel.org/linux-cve-announce/2024022750-CVE-2021-46934-79c8@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46934
https://www.cve.org/CVERecord?id=CVE-2021-46934
|
| kernel-headers |
CVE-2021-46940 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46940
https://git.kernel.org/stable/c/13a779de4175df602366d129e41782ad7168cef0
https://git.kernel.org/stable/c/337b1546cde87fb8588ddaedf0201b769baa572a
https://git.kernel.org/stable/c/dbdf22fc825fdb1d97f23230064e0f9819471628
https://git.kernel.org/stable/c/ea6803ff2cd1a2d7d880256bf562172b708a76ff
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-5-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46940
https://www.cve.org/CVERecord?id=CVE-2021-46940
|
| kernel-headers |
CVE-2021-46941 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46941
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-6-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46941
https://www.cve.org/CVERecord?id=CVE-2021-46941
|
| kernel-headers |
CVE-2021-46944 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46944
https://git.kernel.org/stable/c/14d0e99c3ef6b0648535a31bf2eaabb4eff97b9e
https://git.kernel.org/stable/c/3630901933afba1d16c462b04d569b7576339223
https://git.kernel.org/stable/c/517f6f570566a863c2422b843c8b7d099474f6a9
https://git.kernel.org/stable/c/74ba0adb5e983503b18a96121d965cad34ac7ce3
https://git.kernel.org/stable/c/ff792ae52005c85a2d829c153e08d99a356e007d
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-9-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46944
https://www.cve.org/CVERecord?id=CVE-2021-46944
|
| kernel-headers |
CVE-2021-46947 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46947
https://git.kernel.org/stable/c/99ba0ea616aabdc8e26259fd722503e012199a76
https://git.kernel.org/stable/c/ebeac958b690123a0b40aa61f688f2f170035fad
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-12-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46947
https://www.cve.org/CVERecord?id=CVE-2021-46947
|
| kernel-headers |
CVE-2021-46948 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46948
https://git.kernel.org/stable/c/35c7a83ad1bb1d48ae249346e61b1132bcbf9052
https://git.kernel.org/stable/c/83b09a1807415608b387c7bc748d329fefc5617e
https://git.kernel.org/stable/c/bf2b941d0a6f2d3b9f5fa3c4c21bdd54f71ce253
https://git.kernel.org/stable/c/e531db1ea6f98c9612cb2de093a107c7eadfb96c
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-13-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46948
https://www.cve.org/CVERecord?id=CVE-2021-46948
|
| kernel-headers |
CVE-2021-46949 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46949
https://git.kernel.org/stable/c/5b1faa92289b53cad654123ed2bc8e10f6ddd4ac
https://git.kernel.org/stable/c/98d91180748986bfb6dfb3e72765f3225719a647
https://git.kernel.org/stable/c/a1570985ec04116cc665b760faf666a104154170
https://git.kernel.org/stable/c/fb791572d6747ef385f628450f8d57cd132e6e5a
https://lore.kernel.org/linux-cve-announce/20240227184057.2368370-14-gregkh@linuxfoundation.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46949
https://www.cve.org/CVERecord?id=CVE-2021-46949
|
| kernel-headers |
CVE-2021-46957 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46957
https://git.kernel.org/stable/c/b1ebaa0e1318494a7637099a26add50509e37964
https://git.kernel.org/stable/c/fd0f06590d35c99f98d12c7984897ec4201a6263
https://lore.kernel.org/linux-cve-announce/2024022718-CVE-2021-46957-90af@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46957
https://www.cve.org/CVERecord?id=CVE-2021-46957
|
| kernel-headers |
CVE-2021-46960 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46960
https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27
https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec
https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0
https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f
https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54
https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20
https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd
https://lore.kernel.org/linux-cve-announce/2024022718-CVE-2021-46960-f5ac@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46960
https://www.cve.org/CVERecord?id=CVE-2021-46960
|
| kernel-headers |
CVE-2021-46961 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46961
https://git.kernel.org/stable/c/3f72d3709f53af72835af7dc8b15ba61611a0e36
https://git.kernel.org/stable/c/7be4db5c2b59fa77071c93ca4329876fb9777202
https://git.kernel.org/stable/c/a97709f563a078e259bf0861cd259aa60332890a
https://git.kernel.org/stable/c/e7ea8e46e3b777be26aa855fe07778c415f24926
https://git.kernel.org/stable/c/ea817ac1014c04f47885532b55f5d0898deadfba
https://lore.kernel.org/linux-cve-announce/2024022719-CVE-2021-46961-6212@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46961
https://www.cve.org/CVERecord?id=CVE-2021-46961
|
| kernel-headers |
CVE-2021-46962 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46962
https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7
https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a
https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2
https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e
https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3
https://lore.kernel.org/linux-cve-announce/2024022719-CVE-2021-46962-e081@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46962
https://www.cve.org/CVERecord?id=CVE-2021-46962
|
| kernel-headers |
CVE-2021-46963 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46963
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://lore.kernel.org/linux-cve-announce/2024022719-CVE-2021-46963-32a8@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46963
https://www.cve.org/CVERecord?id=CVE-2021-46963
|
| kernel-headers |
CVE-2021-46964 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46964
https://git.kernel.org/stable/c/0f86d66b38501e3ac66cf2d9f9f8ad6838bad0e6
https://git.kernel.org/stable/c/4ecd42dec858b6632c5f024fe13e9ad6c30f2734
https://git.kernel.org/stable/c/f02d4086a8f36a0e1aaebf559b54cf24a177a486
https://lore.kernel.org/linux-cve-announce/2024022719-CVE-2021-46964-da8c@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46964
https://www.cve.org/CVERecord?id=CVE-2021-46964
|
| kernel-headers |
CVE-2021-46965 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46965
https://git.kernel.org/stable/c/34ec706bf0b7c4ca249a729c1bcb91f706c7a7be
https://git.kernel.org/stable/c/4d786870e3262ec098a3b4ed10b895176bc66ecb
https://git.kernel.org/stable/c/4e4ebb827bf09311469ffd9d0c14ed40ed9747aa
https://git.kernel.org/stable/c/683313993dbe1651c7aa00bb42a041d70e914925
https://lore.kernel.org/linux-cve-announce/2024022719-CVE-2021-46965-3b74@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46965
https://www.cve.org/CVERecord?id=CVE-2021-46965
|
| kernel-headers |
CVE-2021-46967 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46967
https://git.kernel.org/stable/c/3a3e0fad16d40a2aa68ddf7eea4acdf48b22dd44
https://git.kernel.org/stable/c/3b8b6399666a29daa30b0bb3f5c9e3fc81c5a6a6
https://git.kernel.org/stable/c/93dbbf20e3ffad14f04227a0b7105f6e6f0387ce
https://git.kernel.org/stable/c/940230a5c31e2714722aee04c521a21f484b4df7
https://lore.kernel.org/linux-cve-announce/2024022720-CVE-2021-46967-c991@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46967
https://www.cve.org/CVERecord?id=CVE-2021-46967
|
| kernel-headers |
CVE-2021-46968 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46968
https://git.kernel.org/stable/c/026499a9c2e002e621ad568d1378324ae97e5524
https://git.kernel.org/stable/c/055a063a18bcd19b93709e3eac8078d6b2f04599
https://git.kernel.org/stable/c/70fac8088cfad9f3b379c9082832b4d7532c16c2
https://git.kernel.org/stable/c/971dc8706cee47393d393905d294ea47e39503d3
https://lore.kernel.org/linux-cve-announce/2024022720-CVE-2021-46968-8c71@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46968
https://www.cve.org/CVERecord?id=CVE-2021-46968
|
| kernel-headers |
CVE-2021-46969 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46969
https://git.kernel.org/stable/c/0ecc1c70dcd32c0f081b173a1a5d89952686f271
https://git.kernel.org/stable/c/a99b661c3187365f81026d89b1133a76cd2652b3
https://lore.kernel.org/linux-cve-announce/2024022720-CVE-2021-46969-3263@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46969
https://www.cve.org/CVERecord?id=CVE-2021-46969
|
| kernel-headers |
CVE-2021-46970 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46970
https://git.kernel.org/stable/c/0fccbf0a3b690b162f53b13ed8bc442ea33437dc
https://git.kernel.org/stable/c/abd1510c08a13c88d24b622a83c82e87ff1d3135
https://git.kernel.org/stable/c/ed541cff35cbdb695f0c98ef506dd7218883fc07
https://lore.kernel.org/linux-cve-announce/2024022720-CVE-2021-46970-de08@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46970
https://www.cve.org/CVERecord?id=CVE-2021-46970
|
| kernel-headers |
CVE-2021-46976 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46976
https://git.kernel.org/stable/c/402be8a101190969fc7ff122d07e262df86e132b
https://git.kernel.org/stable/c/608441de3976c526b02af4d7063093c8adf351e3
https://git.kernel.org/stable/c/805c990a9c54b9451d3daff640b850909c31ab9d
https://git.kernel.org/stable/c/f7520970d5353cb1fa4d9089a1b23669c5da97fe
https://lore.kernel.org/linux-cve-announce/2024022822-CVE-2021-46976-1dd4@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46976
https://www.cve.org/CVERecord?id=CVE-2021-46976
|
| kernel-headers |
CVE-2021-46979 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46979
https://git.kernel.org/stable/c/11e1cae5da4096552f7c091476cbadbc0d1817da
https://git.kernel.org/stable/c/901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a
https://git.kernel.org/stable/c/ab6c935ba3a04317632f3b8b68675bdbaf395303
https://lore.kernel.org/linux-cve-announce/2024022823-CVE-2021-46979-de90@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46979
https://www.cve.org/CVERecord?id=CVE-2021-46979
|
| kernel-headers |
CVE-2021-46980 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46980
https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc
https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57
https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911
https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d
https://lore.kernel.org/linux-cve-announce/2024022823-CVE-2021-46980-adda@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46980
https://www.cve.org/CVERecord?id=CVE-2021-46980
|
| kernel-headers |
CVE-2021-46981 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46981
https://git.kernel.org/stable/c/1c4962df938891af9ab4775f5224ef8601764107
https://git.kernel.org/stable/c/54b78ba7e96e5fe1edb8054e375d31a6c0dc60dc
https://git.kernel.org/stable/c/79ebe9110fa458d58f1fceb078e2068d7ad37390
https://git.kernel.org/stable/c/b31d237796fd618379ec8e0f4de3370b5e4aeee7
https://git.kernel.org/stable/c/cde4b55cfb24522dcbba80bbdb0c082303e76c43
https://lore.kernel.org/linux-cve-announce/2024022823-CVE-2021-46981-0fb9@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46981
https://www.cve.org/CVERecord?id=CVE-2021-46981
|
| kernel-headers |
CVE-2021-46982 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46982
https://git.kernel.org/stable/c/5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff
https://git.kernel.org/stable/c/64acb100fe3beb5d20184d0ae3307235bd3555c4
https://git.kernel.org/stable/c/936158b15e2648253afb824d252c910c496d34b5
https://git.kernel.org/stable/c/a949dc5f2c5cfe0c910b664650f45371254c0744
https://lore.kernel.org/linux-cve-announce/2024022823-CVE-2021-46982-5134@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46982
https://www.cve.org/CVERecord?id=CVE-2021-46982
|
| kernel-headers |
CVE-2021-46983 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46983
https://git.kernel.org/stable/c/17fb6dfa5162b89ecfa07df891a53afec321abe8
https://git.kernel.org/stable/c/5bdb34466ad8370546dfa0497594fb1d6f2fed90
https://git.kernel.org/stable/c/64f3410c7bfc389b1a58611d0799f4a36ce4b6b5
https://git.kernel.org/stable/c/8cc365f9559b86802afc0208389f5c8d46b4ad61
https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46983
https://www.cve.org/CVERecord?id=CVE-2021-46983
|
| kernel-headers |
CVE-2021-46985 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46985
https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87
https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b
https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712
https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5
https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4
https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb
https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72
https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a
https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46985-4dad@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46985
https://www.cve.org/CVERecord?id=CVE-2021-46985
|
| kernel-headers |
CVE-2021-46991 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46991
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://lore.kernel.org/linux-cve-announce/2024022826-CVE-2021-46991-3c16@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46991
https://www.cve.org/CVERecord?id=CVE-2021-46991
|
| kernel-headers |
CVE-2021-46994 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46994
https://git.kernel.org/stable/c/03c427147b2d3e503af258711af4fc792b89b0af
https://git.kernel.org/stable/c/6f8f1c27b577de15f69fefce3c502bb6300d825c
https://git.kernel.org/stable/c/e1e10a390fd9479209c4d834d916ca5e6d5d396b
https://git.kernel.org/stable/c/eecb4df8ec9f896b19ee05bfa632ac6c1dcd8f21
https://lore.kernel.org/linux-cve-announce/2024022826-CVE-2021-46994-4722@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46994
https://www.cve.org/CVERecord?id=CVE-2021-46994
|
| kernel-headers |
CVE-2021-46997 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46997
https://git.kernel.org/stable/c/4d6a38da8e79e94cbd1344aa90876f0f805db705
https://git.kernel.org/stable/c/51524fa8b5f7b879ba569227738375d283b79382
https://git.kernel.org/stable/c/d8d52005f57bbb4a4ec02f647e2555d327135c68
https://git.kernel.org/stable/c/e67a83f078005461b59b4c776e6b5addd11725fa
https://lore.kernel.org/linux-cve-announce/2024022827-CVE-2021-46997-a93c@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46997
https://www.cve.org/CVERecord?id=CVE-2021-46997
|
| kernel-headers |
CVE-2021-46998 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-46998
https://git.kernel.org/stable/c/25a87b1f566b5eb2af2857a928f0e2310d900976
https://git.kernel.org/stable/c/643001b47adc844ae33510c4bb93c236667008a3
https://git.kernel.org/stable/c/6892396ebf04ea2c021d80e10f4075e014cd7cc3
https://git.kernel.org/stable/c/7afdd6aba95c8a526038e7abe283eeac3e4320f1
https://git.kernel.org/stable/c/d90529392aaf498dafa95d212295d64b2cea4e24
https://git.kernel.org/stable/c/f7f6f07774091a6ddd98500b85386c3c6afb30d3
https://lore.kernel.org/linux-cve-announce/2024022827-CVE-2021-46998-eda2@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-46998
https://www.cve.org/CVERecord?id=CVE-2021-46998
|
| kernel-headers |
CVE-2021-47003 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47003
https://git.kernel.org/stable/c/2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97
https://git.kernel.org/stable/c/28ac8e03c43dfc6a703aa420d18222540b801120
https://git.kernel.org/stable/c/5756f757c72501ef1a16f5f63f940623044180e9
https://git.kernel.org/stable/c/7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa
https://lore.kernel.org/linux-cve-announce/2024022829-CVE-2021-47003-12d7@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47003
https://www.cve.org/CVERecord?id=CVE-2021-47003
|
| kernel-headers |
CVE-2021-47005 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47005
https://git.kernel.org/stable/c/0169d4f0bee44fdfef908c13ed21fcb326c38695
https://git.kernel.org/stable/c/6613bc2301ba291a1c5a90e1dc24cf3edf223c03
https://git.kernel.org/stable/c/679ebad058b8168f10e63876d63b0877fd2fe784
https://git.kernel.org/stable/c/bbed83d7060e07a5d309104d25a00f0a24441428
https://lore.kernel.org/linux-cve-announce/2024022829-CVE-2021-47005-8f88@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47005
https://www.cve.org/CVERecord?id=CVE-2021-47005
|
| kernel-headers |
CVE-2021-47012 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47012
https://git.kernel.org/stable/c/3093ee182f01689b89e9f8797b321603e5de4f63
https://git.kernel.org/stable/c/30b9e92d0b5e5d5dc1101ab856c17009537cbca4
https://git.kernel.org/stable/c/3e22b88e02c194f6c80867abfef5cc09383461f4
https://git.kernel.org/stable/c/608a4b90ece039940e9425ee2b39c8beff27e00c
https://git.kernel.org/stable/c/ad9ce7188432650469a6c7625bf479f5ed0b6155
https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47012-73c5@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47012
https://www.cve.org/CVERecord?id=CVE-2021-47012
|
| kernel-headers |
CVE-2021-47013 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47013
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://lore.kernel.org/linux-cve-announce/2024022831-CVE-2021-47013-034a@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47013
https://www.cve.org/CVERecord?id=CVE-2021-47013
|
| kernel-headers |
CVE-2021-47016 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47016
https://git.kernel.org/stable/c/1dfb26df15fc7036a74221d43de7427f74293dae
https://git.kernel.org/stable/c/43262178c043032e7c42d00de44c818ba05f9967
https://git.kernel.org/stable/c/5d34225169346cab5145978d153b9ce90e9ace21
https://git.kernel.org/stable/c/73fdeb612d25b5e105c219e05434285a45d23576
https://git.kernel.org/stable/c/f6a90818a32058fca62cda3a2027a6a2364e1878
https://lore.kernel.org/linux-cve-announce/2024022919-CVE-2021-47016-320d@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47016
https://www.cve.org/CVERecord?id=CVE-2021-47016
|
| kernel-headers |
CVE-2021-47019 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47019
https://git.kernel.org/stable/c/b13cbc536990ff609afa878b6211cd6f6265ba60
https://git.kernel.org/stable/c/fe3fccde8870764ba3e60610774bd7bc9f8faeff
https://lore.kernel.org/linux-cve-announce/2024022832-CVE-2021-47019-9b9a@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47019
https://www.cve.org/CVERecord?id=CVE-2021-47019
|
| kernel-headers |
CVE-2021-47020 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47020
https://git.kernel.org/stable/c/2f17ac005b320c85d686088cfd4c2e7017912b88
https://git.kernel.org/stable/c/342260fe821047c3d515e3d28085d73fbdce3e80
https://git.kernel.org/stable/c/48f17f96a81763c7c8bf5500460a359b9939359f
https://git.kernel.org/stable/c/7c468deae306d0cbbd539408c26cfec04c66159a
https://git.kernel.org/stable/c/870533403ffa28ff63e173045fc5369365642002
https://git.kernel.org/stable/c/effd2bd62b416f6629e18e3ce077c60de14cfdea
https://lore.kernel.org/linux-cve-announce/2024022920-CVE-2021-47020-78d9@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47020
https://www.cve.org/CVERecord?id=CVE-2021-47020
|
| kernel-headers |
CVE-2021-47022 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47022
https://git.kernel.org/stable/c/107bcbb219ac84d885ac63b25246f8d33212bc47
https://git.kernel.org/stable/c/4fa28c807da54c1d720b3cc12e48eb9bea1e2c8f
https://git.kernel.org/stable/c/6c5b2b0c6e5a6ce2d8f9f85b8b72bfad60eaa506
https://git.kernel.org/stable/c/8ab31da7b89f71c4c2defcca989fab7b42f87d71
https://lore.kernel.org/linux-cve-announce/2024022833-CVE-2021-47022-402e@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47022
https://www.cve.org/CVERecord?id=CVE-2021-47022
|
| kernel-headers |
CVE-2021-47023 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47023
https://git.kernel.org/stable/c/0ce6052802be2cb61a57b753e41301339c88c839
https://git.kernel.org/stable/c/333980481b99edb24ebd5d1a53af70a15d9146de
https://git.kernel.org/stable/c/9d1ba11fabdd8f25abb24272ef1621417981320b
https://git.kernel.org/stable/c/b5bba6ede42693f50ce1c9944315cefed7491061
https://lore.kernel.org/linux-cve-announce/2024022833-CVE-2021-47023-118c@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47023
https://www.cve.org/CVERecord?id=CVE-2021-47023
|
| kernel-headers |
CVE-2021-47025 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47025
https://git.kernel.org/stable/c/5cad9e2caa9613fdcd246bd4ebf0ffbec1cba2ca
https://git.kernel.org/stable/c/b34ea31fe013569d42b7e8681ef3f717f77c5b72
https://lore.kernel.org/linux-cve-announce/2024022834-CVE-2021-47025-cbd5@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47025
https://www.cve.org/CVERecord?id=CVE-2021-47025
|
| kernel-headers |
CVE-2021-47026 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47026
https://git.kernel.org/stable/c/676171f9405dcaa45a33d18241c32f387dbaae39
https://git.kernel.org/stable/c/7f4a8592ff29f19c5a2ca549d0973821319afaad
https://git.kernel.org/stable/c/b64415c6b3476cf9fa4d0aea3807065b8403a937
https://git.kernel.org/stable/c/d3cca8067d43dfee4a3535c645b55f618708dccb
https://lore.kernel.org/linux-cve-announce/2024022834-CVE-2021-47026-4e19@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47026
https://www.cve.org/CVERecord?id=CVE-2021-47026
|
| kernel-headers |
CVE-2021-47027 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47027
https://git.kernel.org/stable/c/a46b536cd60c0dbd4bf767c62a8774dec52bf099
https://git.kernel.org/stable/c/e230f0c44f011f3270680a506b19b7e84c5e8923
https://lore.kernel.org/linux-cve-announce/2024022834-CVE-2021-47027-4a56@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47027
https://www.cve.org/CVERecord?id=CVE-2021-47027
|
| kernel-headers |
CVE-2021-47028 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47028
https://git.kernel.org/stable/c/4bd926e5ca88eac4d95eacb806b229f8729bc62e
https://git.kernel.org/stable/c/dfc8a71448c7d4fec38fb22bdc8a76d79c14b6da
https://git.kernel.org/stable/c/f43b941fd61003659a3f0e039595e5e525917aa8
https://lore.kernel.org/linux-cve-announce/2024022834-CVE-2021-47028-3a13@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47028
https://www.cve.org/CVERecord?id=CVE-2021-47028
|
| kernel-headers |
CVE-2021-47029 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47029
https://git.kernel.org/stable/c/2554b9cb4b5e097c6071ec3ed5bc7c665c477ca7
https://git.kernel.org/stable/c/c996f0346e40e3b1ac2ebaf0681df898fb157f60
https://lore.kernel.org/linux-cve-announce/2024022835-CVE-2021-47029-2c85@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47029
https://www.cve.org/CVERecord?id=CVE-2021-47029
|
| kernel-headers |
CVE-2021-47030 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47030
https://git.kernel.org/stable/c/49cc85059a2cb656f96ff3693f891e8fe8f669a9
https://git.kernel.org/stable/c/54b989653c5531bc4416ced33f146b9cb633d978
https://lore.kernel.org/linux-cve-announce/2024022835-CVE-2021-47030-d1f6@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47030
https://www.cve.org/CVERecord?id=CVE-2021-47030
|
| kernel-headers |
CVE-2021-47031 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47031
https://git.kernel.org/stable/c/4811226374453607175ea057777faa7e7f752204
https://git.kernel.org/stable/c/782b3e86ea970e899f8e723db9f64708a15ca30e
https://lore.kernel.org/linux-cve-announce/2024022835-CVE-2021-47031-75a5@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47031
https://www.cve.org/CVERecord?id=CVE-2021-47031
|
| kernel-headers |
CVE-2021-47032 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47032
https://git.kernel.org/stable/c/4a9dcd6efb2a268fc5707dcfb3b0c412975c4462
https://git.kernel.org/stable/c/4e7914ce23306b28d377ec395e00e5fde0e6f96e
https://git.kernel.org/stable/c/7dcf3c04f0aca746517a77433b33d40868ca4749
https://git.kernel.org/stable/c/e2cdc9cb33c5963efe1a7c022753386f9463d1b7
https://lore.kernel.org/linux-cve-announce/2024022835-CVE-2021-47032-b4df@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47032
https://www.cve.org/CVERecord?id=CVE-2021-47032
|
| kernel-headers |
CVE-2021-47033 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47033
https://git.kernel.org/stable/c/75bc5f779a7664d1fc19cb915039439c6e58bb94
https://git.kernel.org/stable/c/821ae236ccea989a1fcc6abfc4d5b74ad4ba39d2
https://git.kernel.org/stable/c/a025277a80add18c33d01042525a74fe5b875f25
https://git.kernel.org/stable/c/ebee7885bb12a8fe2c2f9bac87dbd87a05b645f9
https://lore.kernel.org/linux-cve-announce/2024022836-CVE-2021-47033-4d0d@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47033
https://www.cve.org/CVERecord?id=CVE-2021-47033
|
| kernel-headers |
CVE-2021-47034 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47034
https://git.kernel.org/stable/c/01ac203e2119d8922126886ddea309fb676f955f
https://git.kernel.org/stable/c/73f9dccb29e4f82574bec2765c0090cdb0404301
https://git.kernel.org/stable/c/84c0762633f2a7ac8399e6b97d3b9bb8e6e1d50f
https://git.kernel.org/stable/c/b3d5d0983388d6c4fb35f7d722556d5595f167a7
https://git.kernel.org/stable/c/b8b2f37cf632434456182e9002d63cbc4cccc50c
https://git.kernel.org/stable/c/e40c52ee67b155ad59f59e73ea136d02685f0e0d
https://lore.kernel.org/linux-cve-announce/2024022836-CVE-2021-47034-0851@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47034
https://www.cve.org/CVERecord?id=CVE-2021-47034
|
| kernel-headers |
CVE-2021-47035 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47035
https://git.kernel.org/stable/c/25faff78138933244c678c7fc78f7c0340fa04a0
https://git.kernel.org/stable/c/66c24699f266ff310381a9552d3576eea8ad6e20
https://git.kernel.org/stable/c/89bd620798704a8805fc9db0d71d7f812cf5b3d2
https://git.kernel.org/stable/c/c848416cc05afc1589edba04fe00b85c2f797ee3
https://git.kernel.org/stable/c/eea53c5816889ee8b64544fa2e9311a81184ff9c
https://lore.kernel.org/linux-cve-announce/2024022836-CVE-2021-47035-e152@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47035
https://www.cve.org/CVERecord?id=CVE-2021-47035
|
| kernel-headers |
CVE-2021-47037 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47037
https://git.kernel.org/stable/c/62413972f5266568848a36fd15160397b211fa74
https://git.kernel.org/stable/c/6893df3753beafa5f7351228a9dd8157a57d7492
https://git.kernel.org/stable/c/96fadf7e8ff49fdb74754801228942b67c3eeebd
https://lore.kernel.org/linux-cve-announce/2024022837-CVE-2021-47037-d130@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47037
https://www.cve.org/CVERecord?id=CVE-2021-47037
|
| kernel-headers |
CVE-2021-47039 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47039
https://git.kernel.org/stable/c/07f86aa8f4fe077be1b018cc177eb8c6573e5671
https://git.kernel.org/stable/c/1ffec389a6431782a8a28805830b6fae9bf00af1
https://git.kernel.org/stable/c/2a3a8bbca28b899806844c00d49ed1b7ccb50957
https://lore.kernel.org/linux-cve-announce/2024022837-CVE-2021-47039-638f@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47039
https://www.cve.org/CVERecord?id=CVE-2021-47039
|
| kernel-headers |
CVE-2021-47042 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47042
https://git.kernel.org/stable/c/296443139f893b554dddd56a99ba8471ab5802d4
https://git.kernel.org/stable/c/616cf23b6cf40ad6f03ffbddfa1b6c4eb68d8ae1
https://lore.kernel.org/linux-cve-announce/2024022838-CVE-2021-47042-142d@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47042
https://www.cve.org/CVERecord?id=CVE-2021-47042
|
| kernel-headers |
CVE-2021-47043 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47043
https://git.kernel.org/stable/c/00b68a7478343afdf83f30c43e64db5296057030
https://git.kernel.org/stable/c/5a465c5391a856a0c1e9554964d660676c35d1b2
https://git.kernel.org/stable/c/711acdf0228dc71601247f28b56f13e850e395c8
https://git.kernel.org/stable/c/940d01eceb3a7866fbfca136a55a5625fc75a565
https://lore.kernel.org/linux-cve-announce/2024022838-CVE-2021-47043-cb3c@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47043
https://www.cve.org/CVERecord?id=CVE-2021-47043
|
| kernel-headers |
CVE-2021-47045 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47045
https://git.kernel.org/stable/c/8dd1c125f7f838abad009b64bff5f0a11afe3cb6
https://git.kernel.org/stable/c/9bdcfbed2a9fe24d2c7eaa1bad7c705e18de8cc7
https://git.kernel.org/stable/c/a09677de458d500b00701f6036baa423d9995408
https://lore.kernel.org/linux-cve-announce/2024022839-CVE-2021-47045-7363@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47045
https://www.cve.org/CVERecord?id=CVE-2021-47045
|
| kernel-headers |
CVE-2021-47049 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47049
https://git.kernel.org/linus/3e9bf43f7f7a46f21ec071cb47be92d0874c48da (5.13-rc1)
https://git.kernel.org/stable/c/2728f289b3270b0e273292b46c534421a33bbfd5
https://git.kernel.org/stable/c/3e9bf43f7f7a46f21ec071cb47be92d0874c48da
https://git.kernel.org/stable/c/d5c7b42c9f56ca46b286daa537d181bd7f69214f
https://git.kernel.org/stable/c/f37dd5d1b5d38a79a4f7b8dd7bbb705505f05560
https://lore.kernel.org/linux-cve-announce/2024022840-CVE-2021-47049-5cc6@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47049
https://www.cve.org/CVERecord?id=CVE-2021-47049
|
| kernel-headers |
CVE-2021-47050 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47050
https://git.kernel.org/stable/c/59e27d7c94aa02da039b000d33c304c179395801
https://git.kernel.org/stable/c/71bcc1b4a1743534d8abdcb57ff912e6bc390438
https://git.kernel.org/stable/c/a74cb41af7dbe019e4096171f8bc641c7ce910ad
https://git.kernel.org/stable/c/e16acc3a37f09e18835dc5d8014942c2ef6ca957
https://lore.kernel.org/linux-cve-announce/2024022840-CVE-2021-47050-5ba5@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47050
https://www.cve.org/CVERecord?id=CVE-2021-47050
|
| kernel-headers |
CVE-2021-47052 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47052
https://git.kernel.org/stable/c/0e596b3734649041ed77edc86a23c0442bbe062b
https://git.kernel.org/stable/c/854b7737199848a91f6adfa0a03cf6f0c46c86e8
https://git.kernel.org/stable/c/b7bd0657c2036add71981d88a7fae50188150b6e
https://git.kernel.org/stable/c/dfd6443bf49ac17adf882ca46c40c506a0284bd6
https://lore.kernel.org/linux-cve-announce/2024022841-CVE-2021-47052-3cca@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47052
https://www.cve.org/CVERecord?id=CVE-2021-47052
|
| kernel-headers |
CVE-2021-47054 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47054
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://lore.kernel.org/linux-cve-announce/2024022950-CVE-2021-47054-c994@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47054
https://www.cve.org/CVERecord?id=CVE-2021-47054
|
| kernel-headers |
CVE-2021-47056 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47056
https://git.kernel.org/stable/c/05ec8192ee4bfdf2a8894a68350dac9f1a155fa6
https://git.kernel.org/stable/c/09d16cee6285d37cc76311c29add6d97a7e4acda
https://git.kernel.org/stable/c/1ea500ce6f7c9106e4a561d28e69215f3d451818
https://git.kernel.org/stable/c/1f50392650ae794a1aea41c213c6a3e1c824413c
https://git.kernel.org/stable/c/20fd40fc6f2c2b41dc6f637f88d494b14e9c21f1
https://git.kernel.org/stable/c/446045cf682af12d9294765f6c46084b374b5654
https://git.kernel.org/stable/c/8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446
https://git.kernel.org/stable/c/f4c4e07140687f42bfa40e091bb4a55d7960ce4d
https://lore.kernel.org/linux-cve-announce/2024022950-CVE-2021-47056-c2b3@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47056
https://www.cve.org/CVERecord?id=CVE-2021-47056
|
| kernel-headers |
CVE-2021-47057 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47057
https://git.kernel.org/stable/c/617ec35ed51f731a593ae7274228ef2cfc9cb781
https://git.kernel.org/stable/c/6516cb852d704ff8d615de1f93cd443a99736c3d
https://git.kernel.org/stable/c/98b5ef3e97b16eaeeedb936f8bda3594ff84a70e
https://git.kernel.org/stable/c/e1f2d739849c3239df1ea3f97d40bade4b808410
https://lore.kernel.org/linux-cve-announce/2024022951-CVE-2021-47057-01fa@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47057
https://www.cve.org/CVERecord?id=CVE-2021-47057
|
| kernel-headers |
CVE-2021-47058 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47058
https://git.kernel.org/stable/c/2dc1554d5f0fdaf47cc5bea442b84b9226fea867
https://git.kernel.org/stable/c/b9e569ae1da3a113b3acee8703c94777fd20938a
https://git.kernel.org/stable/c/c764e375ae647832de1ee73d43a4bb3ef8a8f43d
https://git.kernel.org/stable/c/d8897f7b2283a500666c85ef06e820df38ed7b52
https://git.kernel.org/stable/c/e41a962f82e7afb5b1ee644f48ad0b3aee656268
https://git.kernel.org/stable/c/eb949f891226c012138ffd9df90d1e509f428ae6
https://lore.kernel.org/linux-cve-announce/2024022951-CVE-2021-47058-3130@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47058
https://www.cve.org/CVERecord?id=CVE-2021-47058
|
| kernel-headers |
CVE-2021-47064 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47064
https://git.kernel.org/stable/c/91b9548d413fda488ea853cd1b9f59b572db3a0c
https://git.kernel.org/stable/c/9b68ce2856dadc0e1cb6fd21fbeb850da49efd08
https://git.kernel.org/stable/c/9fa26701cd1fc4d932d431971efc5746325bdfce
https://git.kernel.org/stable/c/b4403cee6400c5f679e9c4a82b91d61aa961eccf
https://lore.kernel.org/linux-cve-announce/2024022954-CVE-2021-47064-f220@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47064
https://www.cve.org/CVERecord?id=CVE-2021-47064
|
| kernel-headers |
CVE-2021-47065 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47065
https://git.kernel.org/stable/c/2ff25985ea9ccc6c9af2c77b0b49045adcc62e0e
https://git.kernel.org/stable/c/5f3dbced8eaa5c9ed7d6943f3fea99f235a6516a
https://git.kernel.org/stable/c/6b5aa0cf321c25f41e09a61c83ee4dc7ab9549cb
https://git.kernel.org/stable/c/95fb153c6027924cda3422120169d1890737f3a0
https://git.kernel.org/stable/c/9cd09722e18a08b6a3d68b8bccfac39ddc22434c
https://lore.kernel.org/linux-cve-announce/2024022954-CVE-2021-47065-be1d@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47065
https://www.cve.org/CVERecord?id=CVE-2021-47065
|
| kernel-headers |
CVE-2021-47066 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47066
https://git.kernel.org/stable/c/29ffa50f33de824b5491f8239c88c4a0efdd03af
https://git.kernel.org/stable/c/53f8208e11abd6dde9480dfcb97fecdb1bc2ac18
https://git.kernel.org/stable/c/cab2e8e5997b592fdb7d02cf2387b4b8e3057174
https://git.kernel.org/stable/c/ceaf2966ab082bbc4d26516f97b3ca8a676e2af8
https://lore.kernel.org/linux-cve-announce/2024022954-CVE-2021-47066-02e0@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47066
https://www.cve.org/CVERecord?id=CVE-2021-47066
|
| kernel-headers |
CVE-2021-47067 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47067
https://git.kernel.org/stable/c/a1ad124c836816fac8bd5e461d36eaf33cee4e24
https://git.kernel.org/stable/c/dc4452867200fa94589b382740952b58aa1c3e6c
https://git.kernel.org/stable/c/ef85bb582c41524e9e68dfdbde48e519dac4ab3d
https://git.kernel.org/stable/c/ff39adf5d31c72025bba799aec69c5c86d81d549
https://lore.kernel.org/linux-cve-announce/2024022955-CVE-2021-47067-8104@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47067
https://www.cve.org/CVERecord?id=CVE-2021-47067
|
| kernel-headers |
CVE-2021-47073 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47073
https://git.kernel.org/stable/c/0cf036a0d325200e6c27b90908e51195bbc557b1
https://git.kernel.org/stable/c/3a53587423d25c87af4b4126a806a0575104b45e
https://git.kernel.org/stable/c/6fa78a6b9a3beb676a010dc489c1257f7e432525
https://git.kernel.org/stable/c/75cfc833da4a2111106d4c134e93e0c7f41e35e7
https://git.kernel.org/stable/c/8d746ea7c687bab060a2c05a35c449302406cd52
https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47073-704a@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2021-47073
https://www.cve.org/CVERecord?id=CVE-2021-47073
|
| kernel-headers |
CVE-2021-47101 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-47101
https://git.kernel.org/stable/c/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03
https://git.kernel.org/stable/c/d259f621c85949f30cc578cac813b82bb5169f56
https://lore.kernel.org/linux-cve-announce/2024030415-CVE-2021-47101-f3fa@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2021-47101
https://www.cve.org/CVERecord?id=CVE-2021-47101
|
| kernel-headers |
CVE-2022-24448 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8267
https://access.redhat.com/security/cve/CVE-2022-24448
https://bugzilla.redhat.com/1980646
https://bugzilla.redhat.com/2037386
https://bugzilla.redhat.com/2051444
https://bugzilla.redhat.com/2052312
https://bugzilla.redhat.com/2053632
https://bugzilla.redhat.com/2058395
https://bugzilla.redhat.com/2059928
https://bugzilla.redhat.com/2066614
https://bugzilla.redhat.com/2066706
https://bugzilla.redhat.com/2066819
https://bugzilla.redhat.com/2070205
https://bugzilla.redhat.com/2071022
https://bugzilla.redhat.com/2073064
https://bugzilla.redhat.com/2074208
https://bugzilla.redhat.com/2084125
https://bugzilla.redhat.com/2084183
https://bugzilla.redhat.com/2084479
https://bugzilla.redhat.com/2088021
https://bugzilla.redhat.com/2089815
https://bugzilla.redhat.com/2090226
https://bugzilla.redhat.com/2090237
https://bugzilla.redhat.com/2090240
https://bugzilla.redhat.com/2090241
https://bugzilla.redhat.com/2103148
https://bugzilla.redhat.com/2103153
https://bugzilla.redhat.com/2114878
https://bugzilla.redhat.com/2115065
https://bugzilla.redhat.com/2115278
https://bugzilla.redhat.com/2123695
https://bugzilla.redhat.com/2129152
https://bugzilla.redhat.com/show_bug.cgi?id=1946279
https://bugzilla.redhat.com/show_bug.cgi?id=1948442
https://bugzilla.redhat.com/show_bug.cgi?id=1977993
https://bugzilla.redhat.com/show_bug.cgi?id=1978539
https://bugzilla.redhat.com/show_bug.cgi?id=1980646
https://bugzilla.redhat.com/show_bug.cgi?id=2004037
https://bugzilla.redhat.com/show_bug.cgi?id=2019942
https://bugzilla.redhat.com/show_bug.cgi?id=2037386
https://bugzilla.redhat.com/show_bug.cgi?id=2042424
https://bugzilla.redhat.com/show_bug.cgi?id=2044837
https://bugzilla.redhat.com/show_bug.cgi?id=2051444
https://bugzilla.redhat.com/show_bug.cgi?id=2053632
https://bugzilla.redhat.com/show_bug.cgi?id=2056383
https://bugzilla.redhat.com/show_bug.cgi?id=2058369
https://bugzilla.redhat.com/show_bug.cgi?id=2058395
https://bugzilla.redhat.com/show_bug.cgi?id=2059928
https://bugzilla.redhat.com/show_bug.cgi?id=2062284
https://bugzilla.redhat.com/show_bug.cgi?id=2062780
https://bugzilla.redhat.com/show_bug.cgi?id=2066614
https://bugzilla.redhat.com/show_bug.cgi?id=2066706
https://bugzilla.redhat.com/show_bug.cgi?id=2066976
https://bugzilla.redhat.com/show_bug.cgi?id=2069408
https://bugzilla.redhat.com/show_bug.cgi?id=2069472
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://bugzilla.redhat.com/show_bug.cgi?id=2070220
https://bugzilla.redhat.com/show_bug.cgi?id=2072552
https://bugzilla.redhat.com/show_bug.cgi?id=2073064
https://bugzilla.redhat.com/show_bug.cgi?id=2074208
https://bugzilla.redhat.com/show_bug.cgi?id=2074317
https://bugzilla.redhat.com/show_bug.cgi?id=2080095
https://bugzilla.redhat.com/show_bug.cgi?id=2084183
https://bugzilla.redhat.com/show_bug.cgi?id=2084479
https://bugzilla.redhat.com/show_bug.cgi?id=2088021
https://bugzilla.redhat.com/show_bug.cgi?id=2089815
https://bugzilla.redhat.com/show_bug.cgi?id=2090940
https://bugzilla.redhat.com/show_bug.cgi?id=2091539
https://bugzilla.redhat.com/show_bug.cgi?id=2096178
https://bugzilla.redhat.com/show_bug.cgi?id=2100259
https://bugzilla.redhat.com/show_bug.cgi?id=2107594
https://bugzilla.redhat.com/show_bug.cgi?id=2109327
https://bugzilla.redhat.com/show_bug.cgi?id=2112693
https://bugzilla.redhat.com/show_bug.cgi?id=2114577
https://bugzilla.redhat.com/show_bug.cgi?id=2114878
https://bugzilla.redhat.com/show_bug.cgi?id=2115065
https://bugzilla.redhat.com/show_bug.cgi?id=2115278
https://bugzilla.redhat.com/show_bug.cgi?id=2120175
https://bugzilla.redhat.com/show_bug.cgi?id=2123695
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27950
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946
https://errata.almalinux.org/9/ALSA-2022-8267.html
https://errata.rockylinux.org/RLSA-2022:7683
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf
https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a
https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf
https://linux.oracle.com/cve/CVE-2022-24448.html
https://linux.oracle.com/errata/ELSA-2022-9314.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html
https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a%40huawei.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2022-24448
https://ubuntu.com/security/notices/USN-5302-1
https://ubuntu.com/security/notices/USN-5383-1
https://ubuntu.com/security/notices/USN-5384-1
https://ubuntu.com/security/notices/USN-5385-1
https://www.cve.org/CVERecord?id=CVE-2022-24448
https://www.debian.org/security/2022/dsa-5092
https://www.debian.org/security/2022/dsa-5096
https://www.spinics.net/lists/stable/msg531976.html
|
| kernel-headers |
CVE-2022-3105 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-3105
https://bugzilla.redhat.com/show_bug.cgi?id=2153067
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3105
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=7694a7de22c53a312ea98960fcafc6ec62046531
https://nvd.nist.gov/vuln/detail/CVE-2022-3105
https://www.cve.org/CVERecord?id=CVE-2022-3105
|
| kernel-headers |
CVE-2022-3106 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-3106
https://bugzilla.redhat.com/show_bug.cgi?id=2153066
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3106
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=407ecd1bd726f240123f704620d46e285ff30dd9
https://nvd.nist.gov/vuln/detail/CVE-2022-3106
https://www.cve.org/CVERecord?id=CVE-2022-3106
|
| kernel-headers |
CVE-2022-3108 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-3108
https://bugzilla.redhat.com/show_bug.cgi?id=2153052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3108
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=abfaf0eee97925905e742aa3b0b72e04a918fa9e
https://linux.oracle.com/cve/CVE-2022-3108.html
https://linux.oracle.com/errata/ELSA-2023-12256.html
https://nvd.nist.gov/vuln/detail/CVE-2022-3108
https://ubuntu.com/security/notices/USN-6027-1
https://ubuntu.com/security/notices/USN-6093-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6256-1
https://www.cve.org/CVERecord?id=CVE-2022-3108
|
| kernel-headers |
CVE-2022-3303 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-3303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3303
https://git.kernel.org/linus/8423f0b6d513b259fdab9c9bf4aaa6188d054c2d (6.0-rc5)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8423f0b6d513b259fdab9c9bf4aaa6188d054c2d
https://linux.oracle.com/cve/CVE-2022-3303.html
https://linux.oracle.com/errata/ELSA-2023-12118.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html
https://lore.kernel.org/all/CAFcO6XN7JDM4xSXGhtusQfS2mSBcx50VJKwQpCq=WeLt57aaZA%40mail.gmail.com/
https://lore.kernel.org/all/CAFcO6XN7JDM4xSXGhtusQfS2mSBcx50VJKwQpCq=WeLt57aaZA@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-3303
https://ubuntu.com/security/notices/USN-5791-1
https://ubuntu.com/security/notices/USN-5791-2
https://ubuntu.com/security/notices/USN-5791-3
https://ubuntu.com/security/notices/USN-5792-1
https://ubuntu.com/security/notices/USN-5792-2
https://ubuntu.com/security/notices/USN-5793-1
https://ubuntu.com/security/notices/USN-5793-2
https://ubuntu.com/security/notices/USN-5793-3
https://ubuntu.com/security/notices/USN-5793-4
https://ubuntu.com/security/notices/USN-5815-1
https://ubuntu.com/security/notices/USN-5877-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://ubuntu.com/security/notices/USN-6071-1
https://ubuntu.com/security/notices/USN-6252-1
https://www.cve.org/CVERecord?id=CVE-2022-3303
https://www.debian.org/security/2022/dsa-5257
|
| kernel-headers |
CVE-2022-3344 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-3344
https://bugzilla.redhat.com/show_bug.cgi?id=2130278
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3344
https://lore.kernel.org/lkml/20221020093055.224317-5-mlevitsk%40redhat.com/T/
https://lore.kernel.org/lkml/20221020093055.224317-5-mlevitsk@redhat.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2022-3344
https://ubuntu.com/security/notices/USN-5911-1
https://ubuntu.com/security/notices/USN-5912-1
https://ubuntu.com/security/notices/USN-5929-1
https://ubuntu.com/security/notices/USN-5935-1
https://ubuntu.com/security/notices/USN-5938-1
https://ubuntu.com/security/notices/USN-5941-1
https://ubuntu.com/security/notices/USN-5950-1
https://ubuntu.com/security/notices/USN-5962-1
https://www.cve.org/CVERecord?id=CVE-2022-3344
|
| kernel-headers |
CVE-2022-3542 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-3542
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=b43f9acbb8942b05252be83ac25a81cec70cc192
https://nvd.nist.gov/vuln/detail/CVE-2022-3542
https://www.cve.org/CVERecord?id=CVE-2022-3542
|
| kernel-headers |
CVE-2022-3903 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-3903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3903
https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com/
https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/
https://lore.kernel.org/all/E1obysd-009Grw-He%40www.linuxtv.org/
https://lore.kernel.org/all/E1obysd-009Grw-He@www.linuxtv.org/
https://nvd.nist.gov/vuln/detail/CVE-2022-3903
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://ubuntu.com/security/notices/USN-6027-1
https://ubuntu.com/security/notices/USN-6029-1
https://ubuntu.com/security/notices/USN-6030-1
https://ubuntu.com/security/notices/USN-6031-1
https://ubuntu.com/security/notices/USN-6093-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6256-1
https://www.cve.org/CVERecord?id=CVE-2022-3903
|
| kernel-headers |
CVE-2022-41850 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-41850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41850
https://linux.oracle.com/cve/CVE-2022-41850.html
https://linux.oracle.com/errata/ELSA-2022-10108.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html
https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
https://lore.kernel.org/all/20220904193115.GA28134%40ubuntu/t/#u
https://lore.kernel.org/all/20220904193115.GA28134@ubuntu/t/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-41850
https://ubuntu.com/security/notices/USN-5793-1
https://ubuntu.com/security/notices/USN-5793-2
https://ubuntu.com/security/notices/USN-5793-3
https://ubuntu.com/security/notices/USN-5793-4
https://ubuntu.com/security/notices/USN-5851-1
https://ubuntu.com/security/notices/USN-5853-1
https://ubuntu.com/security/notices/USN-5854-1
https://ubuntu.com/security/notices/USN-5860-1
https://ubuntu.com/security/notices/USN-5861-1
https://ubuntu.com/security/notices/USN-5862-1
https://ubuntu.com/security/notices/USN-5865-1
https://ubuntu.com/security/notices/USN-5874-1
https://ubuntu.com/security/notices/USN-5875-1
https://ubuntu.com/security/notices/USN-5876-1
https://ubuntu.com/security/notices/USN-5877-1
https://ubuntu.com/security/notices/USN-5883-1
https://ubuntu.com/security/notices/USN-5909-1
https://ubuntu.com/security/notices/USN-5918-1
https://ubuntu.com/security/notices/USN-5924-1
https://ubuntu.com/security/notices/USN-5975-1
https://ubuntu.com/security/notices/USN-5976-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6007-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://www.cve.org/CVERecord?id=CVE-2022-41850
|
| kernel-headers |
CVE-2022-4662 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-4662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4662
https://git.kernel.org/linus/9c6d778800b921bde3bff3cff5003d1650f942d1 (6.0-rc4)
https://linux.oracle.com/cve/CVE-2022-4662.html
https://linux.oracle.com/errata/ELSA-2023-12109.html
https://lore.kernel.org/all/20220913140355.910732567%40linuxfoundation.org/
https://lore.kernel.org/all/20220913140355.910732567@linuxfoundation.org/
https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA%40mail.gmail.com/
https://lore.kernel.org/all/CAB7eexLLApHJwZfMQ=X-PtRhw0BgO+5KcSMS05FNUYejJXqtSA@mail.gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2022-4662
https://ubuntu.com/security/notices/USN-5877-1
https://ubuntu.com/security/notices/USN-6001-1
https://ubuntu.com/security/notices/USN-6013-1
https://ubuntu.com/security/notices/USN-6014-1
https://ubuntu.com/security/notices/USN-6071-1
https://www.cve.org/CVERecord?id=CVE-2022-4662
|
| kernel-headers |
CVE-2022-48628 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-48628
https://git.kernel.org/stable/c/47f82395f04a976d4fa97de7f2acffa1c1096571
https://git.kernel.org/stable/c/89744b64914426cbabceb3d8a149176b5dafdfb5
https://git.kernel.org/stable/c/e3dfcab2080dc1f9a4b09cc1327361bc2845bfcd
https://lore.kernel.org/linux-cve-announce/2024030245-CVE-2022-48628-181a@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-48628
https://www.cve.org/CVERecord?id=CVE-2022-48628
|
| kernel-headers |
CVE-2023-1513 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-1513
https://bugzilla.redhat.com/show_bug.cgi?id=2179892
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1513
https://git.kernel.org/linus/2c10b61421a28e95a46ab489fd56c0f442ff6952 (6.2)
https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952
https://linux.oracle.com/cve/CVE-2023-1513.html
https://linux.oracle.com/errata/ELSA-2023-12323.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/kvm/20230214103304.3689213-1-gregkh%40linuxfoundation.org/
https://nvd.nist.gov/vuln/detail/CVE-2023-1513
https://ubuntu.com/security/notices/USN-6079-1
https://ubuntu.com/security/notices/USN-6080-1
https://ubuntu.com/security/notices/USN-6081-1
https://ubuntu.com/security/notices/USN-6084-1
https://ubuntu.com/security/notices/USN-6085-1
https://ubuntu.com/security/notices/USN-6090-1
https://ubuntu.com/security/notices/USN-6091-1
https://ubuntu.com/security/notices/USN-6092-1
https://ubuntu.com/security/notices/USN-6094-1
https://ubuntu.com/security/notices/USN-6095-1
https://ubuntu.com/security/notices/USN-6096-1
https://ubuntu.com/security/notices/USN-6109-1
https://ubuntu.com/security/notices/USN-6118-1
https://ubuntu.com/security/notices/USN-6132-1
https://ubuntu.com/security/notices/USN-6133-1
https://ubuntu.com/security/notices/USN-6134-1
https://ubuntu.com/security/notices/USN-6222-1
https://ubuntu.com/security/notices/USN-6256-1
https://www.cve.org/CVERecord?id=CVE-2023-1513
|
| kernel-headers |
CVE-2023-3111 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-3111
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3111
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3111
https://patchwork.kernel.org/project/linux-btrfs/patch/20220721074829.2905233-1-r33s3n6%40gmail.com/
https://patchwork.kernel.org/project/linux-btrfs/patch/20220721074829.2905233-1-r33s3n6@gmail.com/
https://security.netapp.com/advisory/ntap-20230703-0007/
https://ubuntu.com/security/notices/USN-6221-1
https://ubuntu.com/security/notices/USN-6252-1
https://ubuntu.com/security/notices/USN-6284-1
https://ubuntu.com/security/notices/USN-6301-1
https://ubuntu.com/security/notices/USN-6312-1
https://ubuntu.com/security/notices/USN-6314-1
https://ubuntu.com/security/notices/USN-6331-1
https://ubuntu.com/security/notices/USN-6337-1
https://www.cve.org/CVERecord?id=CVE-2023-3111
https://www.debian.org/security/2023/dsa-5480
|
| kernel-headers |
CVE-2023-3141 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-3141
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/63264422785021704c39b38f65a78ab9e4a186d7 (6.4-rc1)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7
https://linux.oracle.com/cve/CVE-2023-3141.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/
https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw@mail.gmail.com/t/
https://nvd.nist.gov/vuln/detail/CVE-2023-3141
https://security.netapp.com/advisory/ntap-20230706-0004/
https://ubuntu.com/security/notices/USN-6231-1
https://ubuntu.com/security/notices/USN-6252-1
https://ubuntu.com/security/notices/USN-6254-1
https://ubuntu.com/security/notices/USN-6260-1
https://ubuntu.com/security/notices/USN-6283-1
https://ubuntu.com/security/notices/USN-6284-1
https://ubuntu.com/security/notices/USN-6300-1
https://ubuntu.com/security/notices/USN-6301-1
https://ubuntu.com/security/notices/USN-6311-1
https://ubuntu.com/security/notices/USN-6312-1
https://ubuntu.com/security/notices/USN-6314-1
https://ubuntu.com/security/notices/USN-6331-1
https://ubuntu.com/security/notices/USN-6332-1
https://ubuntu.com/security/notices/USN-6337-1
https://ubuntu.com/security/notices/USN-6347-1
https://ubuntu.com/security/notices/USN-6385-1
https://www.cve.org/CVERecord?id=CVE-2023-3141
|
| kernel-headers |
CVE-2023-3159 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-3159
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3159
https://git.kernel.org/linus/b7c81f80246fac44077166f3e07103affe6db8ff (5.18-rc6)
https://github.com/torvalds/linux/commit/b7c81f80246fac44077166f3e07103affe6db8ff
https://linux.oracle.com/cve/CVE-2023-3159.html
https://linux.oracle.com/errata/ELSA-2023-13043.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3159
https://ubuntu.com/security/notices/USN-6254-1
https://ubuntu.com/security/notices/USN-6341-1
https://www.cve.org/CVERecord?id=CVE-2023-3159
|
| kernel-headers |
CVE-2023-3212 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-3212
https://bugzilla.redhat.com/2024989
https://bugzilla.redhat.com/2073091
https://bugzilla.redhat.com/2133453
https://bugzilla.redhat.com/2133455
https://bugzilla.redhat.com/2139610
https://bugzilla.redhat.com/2147356
https://bugzilla.redhat.com/2148520
https://bugzilla.redhat.com/2149024
https://bugzilla.redhat.com/2151317
https://bugzilla.redhat.com/2156322
https://bugzilla.redhat.com/2165741
https://bugzilla.redhat.com/2165926
https://bugzilla.redhat.com/2168332
https://bugzilla.redhat.com/2173403
https://bugzilla.redhat.com/2173430
https://bugzilla.redhat.com/2173434
https://bugzilla.redhat.com/2173444
https://bugzilla.redhat.com/2174400
https://bugzilla.redhat.com/2175903
https://bugzilla.redhat.com/2176140
https://bugzilla.redhat.com/2177371
https://bugzilla.redhat.com/2177389
https://bugzilla.redhat.com/2181330
https://bugzilla.redhat.com/2182443
https://bugzilla.redhat.com/2184578
https://bugzilla.redhat.com/2185945
https://bugzilla.redhat.com/2187257
https://bugzilla.redhat.com/2188468
https://bugzilla.redhat.com/2192667
https://bugzilla.redhat.com/2192671
https://bugzilla.redhat.com/2193097
https://bugzilla.redhat.com/2193219
https://bugzilla.redhat.com/2213139
https://bugzilla.redhat.com/2213199
https://bugzilla.redhat.com/2213485
https://bugzilla.redhat.com/2213802
https://bugzilla.redhat.com/2214348
https://bugzilla.redhat.com/2215502
https://bugzilla.redhat.com/2215835
https://bugzilla.redhat.com/2215836
https://bugzilla.redhat.com/2215837
https://bugzilla.redhat.com/2218195
https://bugzilla.redhat.com/2218212
https://bugzilla.redhat.com/2218943
https://bugzilla.redhat.com/2221707
https://bugzilla.redhat.com/2223949
https://bugzilla.redhat.com/2225191
https://bugzilla.redhat.com/2225201
https://bugzilla.redhat.com/2225511
https://bugzilla.redhat.com/2236982
https://bugzilla.redhat.com/show_bug.cgi?id=2214348
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212
https://errata.almalinux.org/8/ALSA-2023-7077.html
https://git.kernel.org/linus/504a10d9e46bc37b23d0a1ae2f28973c8516e636 (6.4-rc2)
https://github.com/torvalds/linux/commit/504a10d9e46bc37b23d0a1ae2f28973c8516e636
https://linux.oracle.com/cve/CVE-2023-3212.html
https://linux.oracle.com/errata/ELSA-2023-7077.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3212
https://security.netapp.com/advisory/ntap-20230929-0005/
https://ubuntu.com/security/notices/USN-6231-1
https://ubuntu.com/security/notices/USN-6339-1
https://ubuntu.com/security/notices/USN-6339-2
https://ubuntu.com/security/notices/USN-6339-3
https://ubuntu.com/security/notices/USN-6339-4
https://ubuntu.com/security/notices/USN-6350-1
https://ubuntu.com/security/notices/USN-6351-1
https://ubuntu.com/security/notices/USN-6388-1
https://ubuntu.com/security/notices/USN-6396-1
https://ubuntu.com/security/notices/USN-6396-2
https://ubuntu.com/security/notices/USN-6396-3
https://ubuntu.com/security/notices/USN-6412-1
https://ubuntu.com/security/notices/USN-6417-1
https://ubuntu.com/security/notices/USN-6466-1
https://www.cve.org/CVERecord?id=CVE-2023-3212
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5480
|
| kernel-headers |
CVE-2023-3358 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-3358
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3358
https://git.kernel.org/linus/b3d40c3ec3dc4ad78017de6c3a38979f57aaaab8 (6.2-rc5)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d40c3ec3dc4ad78017de6c3a38979f57aaaab8
https://linux.oracle.com/cve/CVE-2023-3358.html
https://linux.oracle.com/errata/ELSA-2023-6583.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3358
https://www.cve.org/CVERecord?id=CVE-2023-3358
|
| kernel-headers |
CVE-2023-37454 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-37454
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-37454
https://lore.kernel.org/all/00000000000056e02f05dfb6e11a%40google.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2023-37454
https://syzkaller.appspot.com/bug?extid=26873a72980f8fa8bc55
https://syzkaller.appspot.com/bug?extid=60864ed35b1073540d57
https://syzkaller.appspot.com/bug?extid=61564e5023b7229ec85d
https://www.cve.org/CVERecord?id=CVE-2023-37454
|
| kernel-headers |
CVE-2023-47233 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-47233
https://bugzilla.suse.com/show_bug.cgi?id=1216702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47233
https://lore.kernel.org/all/20231104054709.716585-1-zyytlz.wz%40163.com/
https://lore.kernel.org/all/20231104054709.716585-1-zyytlz.wz@163.com/
https://marc.info/?l=linux-kernel&m=169907678011243&w=2
https://nvd.nist.gov/vuln/detail/CVE-2023-47233
https://www.cve.org/CVERecord?id=CVE-2023-47233
|
| kernel-headers |
CVE-2023-52435 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52435
https://git.kernel.org/stable/c/23d05d563b7e7b0314e65c8e882bc27eac2da8e7
https://git.kernel.org/stable/c/6c53e8547687d9c767c139cd4b50af566f58c29a
https://git.kernel.org/stable/c/8f8f185643747fbb448de6aab0efa51c679909a3
https://git.kernel.org/stable/c/95b3904a261a9f810205da560e802cc326f50d77
https://git.kernel.org/stable/c/989b0ff35fe5fc9652ee5bafbe8483db6f27b137
https://git.kernel.org/stable/c/cd1022eaf87be8e6151435bd4df4c242c347e083
https://lore.kernel.org/linux-cve-announce/2024022048-rind-huff-b1a2@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52435
https://www.cve.org/CVERecord?id=CVE-2023-52435
|
| kernel-headers |
CVE-2023-52473 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52473
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52473
https://git.kernel.org/linus/04e6ccfc93c5a1aa1d75a537cf27e418895e20ea (6.8-rc1)
https://git.kernel.org/stable/c/02871710b93058eb1249d5847c0b2d1c2c3c98ae
https://git.kernel.org/stable/c/04e6ccfc93c5a1aa1d75a537cf27e418895e20ea
https://git.kernel.org/stable/c/335176dd8ebaca6493807dceea33c478305667fa
https://lore.kernel.org/linux-cve-announce/2024022547-CVE-2023-52473-c3cc@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52473
https://www.cve.org/CVERecord?id=CVE-2023-52473
|
| kernel-headers |
CVE-2023-52474 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52474
https://git.kernel.org/stable/c/00cbce5cbf88459cd1aa1d60d0f1df15477df127
https://git.kernel.org/stable/c/7e6010f79b58f45b204cf18aa58f4b73c3f30adc
https://git.kernel.org/stable/c/9c4c6512d7330b743c4ffd18bd999a86ca26db0d
https://git.kernel.org/stable/c/a2bd706ab63509793b5cd5065e685b7ef5cba678
https://git.kernel.org/stable/c/c76cb8f4bdf26d04cfa5485a93ce297dba5e6a80
https://git.kernel.org/stable/c/dce59b5443700fbd0d2433ec6e4d4cf063448844
https://nvd.nist.gov/vuln/detail/CVE-2023-52474
https://www.cve.org/CVERecord?id=CVE-2023-52474
|
| kernel-headers |
CVE-2023-52477 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52477
https://git.kernel.org/stable/c/136f69a04e71ba3458d137aec3bb2ce1232c0289
https://git.kernel.org/stable/c/241f230324337ed5eae3846a554fb6d15169872c
https://git.kernel.org/stable/c/528f0ba9f7a4bc1b61c9b6eb591ff97ca37cac6b
https://git.kernel.org/stable/c/6ad3e9fd3632106696692232bf7ff88b9f7e1bc3
https://git.kernel.org/stable/c/8e7346bfea56453e31b7421c1c17ca2fb9ed613d
https://git.kernel.org/stable/c/c64e4dca9aefd232b17ac4c779b608b286654e81
https://git.kernel.org/stable/c/f74a7afc224acd5e922c7a2e52244d891bbe44ee
https://git.kernel.org/stable/c/fb9895ab9533534335fa83d70344b397ac862c81
https://lore.kernel.org/linux-cve-announce/2024022921-CVE-2023-52477-6f20@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52477
https://www.cve.org/CVERecord?id=CVE-2023-52477
|
| kernel-headers |
CVE-2023-52484 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52484
https://git.kernel.org/stable/c/3283a1bce9bbc978059f790b84f3c10c32492429
https://git.kernel.org/stable/c/d5afb4b47e13161b3f33904d45110f9e6463bad6
https://git.kernel.org/stable/c/f5a604757aa8e37ea9c7011dc9da54fa1b30f29b
https://git.kernel.org/stable/c/f90f4c562003ac3d3b135c5a40a5383313f27264
https://lore.kernel.org/linux-cve-announce/2024022923-CVE-2023-52484-3635@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52484
https://www.cve.org/CVERecord?id=CVE-2023-52484
|
| kernel-headers |
CVE-2023-52485 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52485
https://git.kernel.org/stable/c/303197775a97416b62d4da69280d0c120a20e009
https://git.kernel.org/stable/c/8892780834ae294bc3697c7d0e056d7743900b39
https://lore.kernel.org/linux-cve-announce/20240229150009.1525992-2-lee@kernel.org/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52485
https://www.cve.org/CVERecord?id=CVE-2023-52485
|
| kernel-headers |
CVE-2023-52500 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52500
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://lore.kernel.org/linux-cve-announce/2024030248-CVE-2023-52500-3d53@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52500
https://www.cve.org/CVERecord?id=CVE-2023-52500
|
| kernel-headers |
CVE-2023-52508 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52508
https://git.kernel.org/stable/c/8ae5b3a685dc59a8cf7ccfe0e850999ba9727a3c
https://git.kernel.org/stable/c/be90c9e29dd59b7d19a73297a1590ff3ec1d22ea
https://git.kernel.org/stable/c/dd46b3ac7322baf3772b33b29726e94f98289db7
https://lore.kernel.org/linux-cve-announce/2024030250-CVE-2023-52508-359c@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2023-52508
https://www.cve.org/CVERecord?id=CVE-2023-52508
|
| kernel-headers |
CVE-2023-52594 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52594
https://git.kernel.org/linus/2adc886244dff60f948497b59affb6c6ebb3c348 (6.8-rc1)
https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234
https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348
https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1
https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9
https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1
https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d
https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225
https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc
https://lore.kernel.org/linux-cve-announce/2024030645-CVE-2023-52594-9b84@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2023-52594
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52594
|
| kernel-headers |
CVE-2023-52595 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52595
https://git.kernel.org/linus/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8 (6.8-rc1)
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://lore.kernel.org/linux-cve-announce/2024030645-CVE-2023-52595-d018@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2023-52595
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52595
|
| kernel-headers |
CVE-2023-52605 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-52605
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52605
https://git.kernel.org/linus/72d9b9747e78979510e9aafdd32eb99c7aa30dd1 (6.8-rc1)
https://git.kernel.org/stable/c/33650372e3ead97c5ab3b84d9ad97737bc5e00c0
https://git.kernel.org/stable/c/5457b0cbaa0238fc56b855c4ef2c0b9cc9c559ab
https://git.kernel.org/stable/c/72d9b9747e78979510e9aafdd32eb99c7aa30dd1
https://git.kernel.org/stable/c/77846571b3ba6a6125a20ad109bb8514ba884cf9
https://git.kernel.org/stable/c/b17a71435e7e153e949df018244a98b4ede04069
https://git.kernel.org/stable/c/b7b33627be0626b16ca321b982d6a2261ef7f703
https://git.kernel.org/stable/c/d2049af7ddbc361702c3e1f09bd6c5e9488454ca
https://git.kernel.org/stable/c/f066171de33d71ff0f7c46bd17636a5a26db3fb6
https://lore.kernel.org/linux-cve-announce/2024030647-CVE-2023-52605-292a@gregkh/T
https://nvd.nist.gov/vuln/detail/CVE-2023-52605
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2023-52605
|
| kernel-headers |
CVE-2023-6121 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-6121
https://bugzilla.redhat.com/show_bug.cgi?id=2250043
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://lore.kernel.org/linux-nvme/CAK5usQvxAyC3LJ4OnqerS1P0JpbfFr9uRZmq6Jb4QhaB7AQCoQ@mail.gmail.com/T/
https://lore.kernel.org/linux-nvme/b58a2dc6-cc8f-4d19-9efe-e1d5b4505efc@nvidia.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2023-6121
https://ubuntu.com/security/notices/USN-6639-1
https://ubuntu.com/security/notices/USN-6680-1
https://ubuntu.com/security/notices/USN-6680-2
https://ubuntu.com/security/notices/USN-6681-1
https://ubuntu.com/security/notices/USN-6681-2
https://ubuntu.com/security/notices/USN-6681-3
https://ubuntu.com/security/notices/USN-6686-1
https://ubuntu.com/security/notices/USN-6686-2
https://www.cve.org/CVERecord?id=CVE-2023-6121
|
| kernel-headers |
CVE-2023-7042 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-7042
https://bugzilla.redhat.com/show_bug.cgi?id=2255497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7042
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/ath.git/commit/?h=ath-next&id=ad25ee36f00172f7d53242dc77c69fff7ced0755
https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/ath.git/log/?h=ath-next
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/54PLF5J33IRSLSR4UU6LQSMXX6FI5AOQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C25BK2YH5MZ6VNQXKF2NAJBTGXVEPKGC/
https://lore.kernel.org/all/20231208043433.271449-1-hdthky0@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2023-7042
https://patchwork.kernel.org/project/linux-wireless/patch/20231208043433.271449-1-hdthky0@gmail.com/
https://www.cve.org/CVERecord?id=CVE-2023-7042
|
| kernel-headers |
CVE-2024-0340 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-0340
https://bugzilla.redhat.com/show_bug.cgi?id=2257406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0340
https://git.kernel.org/linus/4d8df0f5f79f747d75a7d356d9b9ea40a4e4c8a9 (6.4-rc6)
https://lore.kernel.org/lkml/5kn47peabxjrptkqa6dwtyus35ahf4pcj4qm4pumse33kxqpjw@mec4se5relrc/T/
https://nvd.nist.gov/vuln/detail/CVE-2024-0340
https://ubuntu.com/security/notices/USN-6681-1
https://ubuntu.com/security/notices/USN-6681-2
https://ubuntu.com/security/notices/USN-6681-3
https://ubuntu.com/security/notices/USN-6686-1
https://ubuntu.com/security/notices/USN-6686-2
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2024-0340
|
| kernel-headers |
CVE-2024-23196 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-23196
https://bugzilla.openanolis.cn/show_bug.cgi?id=8148
https://nvd.nist.gov/vuln/detail/CVE-2024-23196
https://www.cve.org/CVERecord?id=CVE-2024-23196
|
| kernel-headers |
CVE-2024-24855 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-24855
https://bugzilla.openanolis.cn/show_bug.cgi?id=8149
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24855
https://lore.kernel.org/all/20230630024748.1035993-1-islituo@gmail.com/
https://nvd.nist.gov/vuln/detail/CVE-2024-24855
https://www.cve.org/CVERecord?id=CVE-2024-24855
|
| kernel-headers |
CVE-2024-26600 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600
https://git.kernel.org/linus/7104ba0f1958adb250319e68a15eff89ec4fd36d (6.8-rc3)
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://lore.kernel.org/linux-cve-announce/2024022405-CVE-2024-26600-44a2@gregkh/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2024-26600
https://ubuntu.com/security/notices/USN-6688-1
https://www.cve.org/CVERecord?id=CVE-2024-26600
|
| kernel-headers |
CVE-2024-26606 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26606
https://git.kernel.org/stable/c/42beab162dcee1e691ee4934292d51581c29df61
https://git.kernel.org/stable/c/82722b453dc2f967b172603e389ee7dc1b3137cc
https://git.kernel.org/stable/c/90e09c016d72b91e76de25f71c7b93d94cc3c769
https://git.kernel.org/stable/c/93b372c39c40cbf179e56621e6bc48240943af69
https://git.kernel.org/stable/c/97830f3c3088638ff90b20dfba2eb4d487bf14d7
https://git.kernel.org/stable/c/a423042052ec2bdbf1e552e621e6a768922363cc
https://git.kernel.org/stable/c/a7ae586f6f6024f490b8546c8c84670f96bb9b68
https://git.kernel.org/stable/c/dd64bb8329ce0ea27bc557e4160c2688835402ac
https://nvd.nist.gov/vuln/detail/CVE-2024-26606
https://www.cve.org/CVERecord?id=CVE-2024-26606
|
| kernel-headers |
CVE-2024-26617 |
LOW |
3.10.0-1160.108.1.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-26617
https://git.kernel.org/stable/c/05509adf297924f51e1493aa86f9fcde1433ed80
https://git.kernel.org/stable/c/4cccb6221cae6d020270606b9e52b1678fc8b71a
https://lore.kernel.org/linux-cve-announce/20240229155245.1571576-49-lee@kernel.org/T
https://nvd.nist.gov/vuln/detail/CVE-2024-26617
https://www.cve.org/CVERecord?id=CVE-2024-26617
|
| krb5-libs |
CVE-2014-5351 |
MEDIUM |
1.15.1-55.el7_9 |
|
http://advisories.mageia.org/MGASA-2014-0477.html
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html
http://security.gentoo.org/glsa/glsa-201412-53.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2014:224
http://www.securityfocus.com/bid/70380
http://www.securitytracker.com/id/1031003
http://www.ubuntu.com/usn/USN-2498-1
https://access.redhat.com/security/cve/CVE-2014-5351
https://bugzilla.redhat.com/show_bug.cgi?id=1145425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351
https://exchange.xforce.ibmcloud.com/vulnerabilities/97028
https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca
https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html
https://nvd.nist.gov/vuln/detail/CVE-2014-5351
https://ubuntu.com/security/notices/USN-2498-1
https://www.cve.org/CVERecord?id=CVE-2014-5351
|
| krb5-libs |
CVE-2015-2695 |
MEDIUM |
1.15.1-55.el7_9 |
|
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/90687
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695
https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d
https://nvd.nist.gov/vuln/detail/CVE-2015-2695
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
https://www.cve.org/CVERecord?id=CVE-2015-2695
|
| krb5-libs |
CVE-2015-2696 |
MEDIUM |
1.15.1-55.el7_9 |
|
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.securityfocus.com/bid/90675
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696
https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a
https://nvd.nist.gov/vuln/detail/CVE-2015-2696
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
https://www.cve.org/CVERecord?id=CVE-2015-2696
|
| krb5-libs |
CVE-2015-2697 |
MEDIUM |
1.15.1-55.el7_9 |
|
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html
http://www.debian.org/security/2015/dsa-3395
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/77581
http://www.securitytracker.com/id/1034084
http://www.ubuntu.com/usn/USN-2810-1
https://access.redhat.com/security/cve/CVE-2015-2697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697
https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789
https://nvd.nist.gov/vuln/detail/CVE-2015-2697
https://security.gentoo.org/glsa/201611-14
https://ubuntu.com/security/notices/USN-2810-1
https://www.cve.org/CVERecord?id=CVE-2015-2697
|
| krb5-libs |
CVE-2017-15088 |
MEDIUM |
1.15.1-55.el7_9 |
|
http://www.securityfocus.com/bid/101594
https://access.redhat.com/security/cve/CVE-2017-15088
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
https://bugzilla.redhat.com/show_bug.cgi?id=1504045
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088
https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
https://github.com/krb5/krb5/pull/707
https://nvd.nist.gov/vuln/detail/CVE-2017-15088
https://www.cve.org/CVERecord?id=CVE-2017-15088
|
| krb5-libs |
CVE-2020-17049 |
MEDIUM |
1.15.1-55.el7_9 |
|
http://www.openwall.com/lists/oss-security/2021/11/10/3
https://access.redhat.com/errata/RHSA-2023:2570
https://access.redhat.com/security/cve/CVE-2020-17049
https://bugzilla.redhat.com/2025721
https://errata.almalinux.org/9/ALSA-2023-2570.html
https://linux.oracle.com/cve/CVE-2020-17049.html
https://linux.oracle.com/errata/ELSA-2024-0143.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049
https://nvd.nist.gov/vuln/detail/CVE-2020-17049
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049
https://security.gentoo.org/glsa/202309-06
https://www.cve.org/CVERecord?id=CVE-2020-17049
|
| krb5-libs |
CVE-2020-28196 |
MEDIUM |
1.15.1-55.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-28196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196
https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd
https://linux.oracle.com/cve/CVE-2020-28196.html
https://linux.oracle.com/errata/ELSA-2021-9294.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/
https://nvd.nist.gov/vuln/detail/CVE-2020-28196
https://security.gentoo.org/glsa/202011-17
https://security.netapp.com/advisory/ntap-20201202-0001/
https://security.netapp.com/advisory/ntap-20210513-0002/
https://ubuntu.com/security/notices/USN-4635-1
https://www.cve.org/CVERecord?id=CVE-2020-28196
https://www.debian.org/security/2020/dsa-4795
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| krb5-libs |
CVE-2021-36222 |
MEDIUM |
1.15.1-55.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-36222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222
https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562
https://github.com/krb5/krb5/releases
https://linux.oracle.com/cve/CVE-2021-36222.html
https://linux.oracle.com/errata/ELSA-2021-3576.html
https://nvd.nist.gov/vuln/detail/CVE-2021-36222
https://security.netapp.com/advisory/ntap-20211022-0003/
https://security.netapp.com/advisory/ntap-20211104-0007/
https://ubuntu.com/security/notices/USN-5959-1
https://web.mit.edu/kerberos/advisories/
https://www.cve.org/CVERecord?id=CVE-2021-36222
https://www.debian.org/security/2021/dsa-4944
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| krb5-libs |
CVE-2017-11462 |
LOW |
1.15.1-55.el7_9 |
|
http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
https://access.redhat.com/security/cve/CVE-2017-11462
https://bugzilla.redhat.com/show_bug.cgi?id=1488873
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462
https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
https://nvd.nist.gov/vuln/detail/CVE-2017-11462
https://www.cve.org/CVERecord?id=CVE-2017-11462
|
| krb5-libs |
CVE-2024-26458 |
LOW |
1.15.1-55.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2024-26458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_1.md
https://nvd.nist.gov/vuln/detail/CVE-2024-26458
https://www.cve.org/CVERecord?id=CVE-2024-26458
|
| krb5-libs |
CVE-2024-26461 |
LOW |
1.15.1-55.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2024-26461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_2.md
https://nvd.nist.gov/vuln/detail/CVE-2024-26461
https://www.cve.org/CVERecord?id=CVE-2024-26461
|
| krb5-libs |
CVE-2024-26462 |
LOW |
1.15.1-55.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2024-26462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26462
https://github.com/LuMingYinDetect/krb5_defects/blob/main/krb5_detect_3.md
https://nvd.nist.gov/vuln/detail/CVE-2024-26462
https://www.cve.org/CVERecord?id=CVE-2024-26462
|
| less |
CVE-2022-48624 |
MEDIUM |
458-9.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-48624
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48624
https://github.com/gwsw/less/commit/c6ac6de49698be84d264a0c4c0c40bb870b10144
https://github.com/gwsw/less/compare/v605...v606
https://greenwoodsoftware.com/less/
https://nvd.nist.gov/vuln/detail/CVE-2022-48624
https://ubuntu.com/security/notices/USN-6664-1
https://www.cve.org/CVERecord?id=CVE-2022-48624
|
| less |
CVE-2014-9488 |
LOW |
458-9.el7 |
|
http://advisories.mageia.org/MGASA-2015-0139.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159449.html
http://lists.opensuse.org/opensuse-updates/2015-03/msg00077.html
http://www.mandriva.com/security/advisories?name=MDVSA-2015:199
https://access.redhat.com/security/cve/CVE-2014-9488
https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html
https://nvd.nist.gov/vuln/detail/CVE-2014-9488
https://www.cve.org/CVERecord?id=CVE-2014-9488
|
| libX11 |
CVE-2016-7943 |
MEDIUM |
1.6.7-4.el7_9 |
|
http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93362
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7943
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://nvd.nist.gov/vuln/detail/CVE-2016-7943
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
https://www.cve.org/CVERecord?id=CVE-2016-7943
|
| libX11 |
CVE-2020-14344 |
MEDIUM |
1.6.7-4.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html
https://access.redhat.com/security/cve/CVE-2020-14344
https://bugzilla.redhat.com/show_bug.cgi?id=1826141
https://bugzilla.redhat.com/show_bug.cgi?id=1854920
https://bugzilla.redhat.com/show_bug.cgi?id=1856738
https://bugzilla.redhat.com/show_bug.cgi?id=1862241
https://bugzilla.redhat.com/show_bug.cgi?id=1862246
https://bugzilla.redhat.com/show_bug.cgi?id=1862255
https://bugzilla.redhat.com/show_bug.cgi?id=1862258
https://bugzilla.redhat.com/show_bug.cgi?id=1863142
https://bugzilla.redhat.com/show_bug.cgi?id=1869139
https://bugzilla.redhat.com/show_bug.cgi?id=1869142
https://bugzilla.redhat.com/show_bug.cgi?id=1869144
https://bugzilla.redhat.com/show_bug.cgi?id=1872473
https://bugzilla.redhat.com/show_bug.cgi?id=1878160
https://bugzilla.redhat.com/show_bug.cgi?id=1886644
https://bugzilla.redhat.com/show_bug.cgi?id=1886648
https://bugzilla.redhat.com/show_bug.cgi?id=1887276
https://bugzilla.redhat.com/show_bug.cgi?id=1887654
https://bugzilla.redhat.com/show_bug.cgi?id=1887655
https://bugzilla.redhat.com/show_bug.cgi?id=1891871
https://bugzilla.redhat.com/show_bug.cgi?id=1896442
https://bugzilla.redhat.com/show_bug.cgi?id=1897439
https://bugzilla.redhat.com/show_bug.cgi?id=1914411
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712
https://errata.almalinux.org/8/ALSA-2021-1804.html
https://errata.rockylinux.org/RLSA-2021:1804
https://linux.oracle.com/cve/CVE-2020-14344.html
https://linux.oracle.com/errata/ELSA-2021-1804.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/
https://lists.x.org/archives/xorg-announce/2020-July/003050.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14344
https://security.gentoo.org/glsa/202008-18
https://ubuntu.com/security/notices/USN-4487-1
https://ubuntu.com/security/notices/USN-4487-2
https://usn.ubuntu.com/4487-1/
https://usn.ubuntu.com/4487-2/
https://www.cve.org/CVERecord?id=CVE-2020-14344
https://www.openwall.com/lists/oss-security/2020/07/31/1
|
| libX11 |
CVE-2022-3554 |
MEDIUM |
1.6.7-4.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-3554
https://nvd.nist.gov/vuln/detail/CVE-2022-3554
https://ubuntu.com/security/CVE-2022-3554
https://www.cve.org/CVERecord?id=CVE-2022-3554
|
| libX11 |
CVE-2023-3138 |
MEDIUM |
1.6.7-4.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:6497
https://access.redhat.com/security/cve/CVE-2023-3138
https://bugzilla.redhat.com/2213748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138
https://errata.almalinux.org/9/ALSA-2023-6497.html
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/304a654a0d57bf0f00d8998185f0360332cfa36c
https://linux.oracle.com/cve/CVE-2023-3138.html
https://linux.oracle.com/errata/ELSA-2023-7029.html
https://lists.x.org/archives/xorg-announce/2023-June/003406.html
https://lists.x.org/archives/xorg-announce/2023-June/003407.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3138
https://security.netapp.com/advisory/ntap-20231208-0008/
https://ubuntu.com/security/notices/USN-6168-1
https://ubuntu.com/security/notices/USN-6168-2
https://www.cve.org/CVERecord?id=CVE-2023-3138
|
| libX11 |
CVE-2023-43785 |
MEDIUM |
1.6.7-4.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-43785
https://bugzilla.redhat.com/show_bug.cgi?id=2242252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
https://nvd.nist.gov/vuln/detail/CVE-2023-43785
https://security.netapp.com/advisory/ntap-20231103-0006/
https://ubuntu.com/security/notices/USN-6407-1
https://ubuntu.com/security/notices/USN-6407-2
https://www.cve.org/CVERecord?id=CVE-2023-43785
|
| libX11 |
CVE-2023-43786 |
MEDIUM |
1.6.7-4.el7_9 |
|
http://www.openwall.com/lists/oss-security/2024/01/24/9
https://access.redhat.com/security/cve/CVE-2023-43786
https://bugzilla.redhat.com/show_bug.cgi?id=2242253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63IBRFLQVZSMOAZBZOBKFWJP26ILRAGQ/
https://nvd.nist.gov/vuln/detail/CVE-2023-43786
https://security.netapp.com/advisory/ntap-20231103-0006/
https://ubuntu.com/security/notices/USN-6407-1
https://ubuntu.com/security/notices/USN-6407-2
https://ubuntu.com/security/notices/USN-6408-1
https://ubuntu.com/security/notices/USN-6408-2
https://www.cve.org/CVERecord?id=CVE-2023-43786
|
| libX11 |
CVE-2023-43787 |
MEDIUM |
1.6.7-4.el7_9 |
|
http://www.openwall.com/lists/oss-security/2024/01/24/9
https://access.redhat.com/security/cve/CVE-2023-43787
https://bugzilla.redhat.com/show_bug.cgi?id=2242254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
https://jfrog.com/blog/xorg-libx11-vulns-cve-2023-43786-cve-2023-43787-part-two/
https://nvd.nist.gov/vuln/detail/CVE-2023-43787
https://security.netapp.com/advisory/ntap-20231103-0006/
https://ubuntu.com/security/notices/USN-6407-1
https://ubuntu.com/security/notices/USN-6407-2
https://ubuntu.com/security/notices/USN-6408-1
https://ubuntu.com/security/notices/USN-6408-2
https://www.cve.org/CVERecord?id=CVE-2023-43787
|
| libX11 |
CVE-2016-7942 |
LOW |
1.6.7-4.el7_9 |
|
http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93363
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7942
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://nvd.nist.gov/vuln/detail/CVE-2016-7942
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
https://www.cve.org/CVERecord?id=CVE-2016-7942
|
| libX11 |
CVE-2022-3555 |
LOW |
1.6.7-4.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-3555
https://nvd.nist.gov/vuln/detail/CVE-2022-3555
https://ubuntu.com/security/CVE-2022-3555
https://www.cve.org/CVERecord?id=CVE-2022-3555
|
| libX11-common |
CVE-2016-7943 |
MEDIUM |
1.6.7-4.el7_9 |
|
http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93362
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7943
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://nvd.nist.gov/vuln/detail/CVE-2016-7943
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
https://www.cve.org/CVERecord?id=CVE-2016-7943
|
| libX11-common |
CVE-2020-14344 |
MEDIUM |
1.6.7-4.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html
https://access.redhat.com/security/cve/CVE-2020-14344
https://bugzilla.redhat.com/show_bug.cgi?id=1826141
https://bugzilla.redhat.com/show_bug.cgi?id=1854920
https://bugzilla.redhat.com/show_bug.cgi?id=1856738
https://bugzilla.redhat.com/show_bug.cgi?id=1862241
https://bugzilla.redhat.com/show_bug.cgi?id=1862246
https://bugzilla.redhat.com/show_bug.cgi?id=1862255
https://bugzilla.redhat.com/show_bug.cgi?id=1862258
https://bugzilla.redhat.com/show_bug.cgi?id=1863142
https://bugzilla.redhat.com/show_bug.cgi?id=1869139
https://bugzilla.redhat.com/show_bug.cgi?id=1869142
https://bugzilla.redhat.com/show_bug.cgi?id=1869144
https://bugzilla.redhat.com/show_bug.cgi?id=1872473
https://bugzilla.redhat.com/show_bug.cgi?id=1878160
https://bugzilla.redhat.com/show_bug.cgi?id=1886644
https://bugzilla.redhat.com/show_bug.cgi?id=1886648
https://bugzilla.redhat.com/show_bug.cgi?id=1887276
https://bugzilla.redhat.com/show_bug.cgi?id=1887654
https://bugzilla.redhat.com/show_bug.cgi?id=1887655
https://bugzilla.redhat.com/show_bug.cgi?id=1891871
https://bugzilla.redhat.com/show_bug.cgi?id=1896442
https://bugzilla.redhat.com/show_bug.cgi?id=1897439
https://bugzilla.redhat.com/show_bug.cgi?id=1914411
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14360
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14363
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25712
https://errata.almalinux.org/8/ALSA-2021-1804.html
https://errata.rockylinux.org/RLSA-2021:1804
https://linux.oracle.com/cve/CVE-2020-14344.html
https://linux.oracle.com/errata/ELSA-2021-1804.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/
https://lists.x.org/archives/xorg-announce/2020-July/003050.html
https://nvd.nist.gov/vuln/detail/CVE-2020-14344
https://security.gentoo.org/glsa/202008-18
https://ubuntu.com/security/notices/USN-4487-1
https://ubuntu.com/security/notices/USN-4487-2
https://usn.ubuntu.com/4487-1/
https://usn.ubuntu.com/4487-2/
https://www.cve.org/CVERecord?id=CVE-2020-14344
https://www.openwall.com/lists/oss-security/2020/07/31/1
|
| libX11-common |
CVE-2022-3554 |
MEDIUM |
1.6.7-4.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-3554
https://nvd.nist.gov/vuln/detail/CVE-2022-3554
https://ubuntu.com/security/CVE-2022-3554
https://www.cve.org/CVERecord?id=CVE-2022-3554
|
| libX11-common |
CVE-2023-3138 |
MEDIUM |
1.6.7-4.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:6497
https://access.redhat.com/security/cve/CVE-2023-3138
https://bugzilla.redhat.com/2213748
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138
https://errata.almalinux.org/9/ALSA-2023-6497.html
https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/304a654a0d57bf0f00d8998185f0360332cfa36c
https://linux.oracle.com/cve/CVE-2023-3138.html
https://linux.oracle.com/errata/ELSA-2023-7029.html
https://lists.x.org/archives/xorg-announce/2023-June/003406.html
https://lists.x.org/archives/xorg-announce/2023-June/003407.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3138
https://security.netapp.com/advisory/ntap-20231208-0008/
https://ubuntu.com/security/notices/USN-6168-1
https://ubuntu.com/security/notices/USN-6168-2
https://www.cve.org/CVERecord?id=CVE-2023-3138
|
| libX11-common |
CVE-2023-43785 |
MEDIUM |
1.6.7-4.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-43785
https://bugzilla.redhat.com/show_bug.cgi?id=2242252
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785
https://nvd.nist.gov/vuln/detail/CVE-2023-43785
https://security.netapp.com/advisory/ntap-20231103-0006/
https://ubuntu.com/security/notices/USN-6407-1
https://ubuntu.com/security/notices/USN-6407-2
https://www.cve.org/CVERecord?id=CVE-2023-43785
|
| libX11-common |
CVE-2023-43786 |
MEDIUM |
1.6.7-4.el7_9 |
|
http://www.openwall.com/lists/oss-security/2024/01/24/9
https://access.redhat.com/security/cve/CVE-2023-43786
https://bugzilla.redhat.com/show_bug.cgi?id=2242253
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63IBRFLQVZSMOAZBZOBKFWJP26ILRAGQ/
https://nvd.nist.gov/vuln/detail/CVE-2023-43786
https://security.netapp.com/advisory/ntap-20231103-0006/
https://ubuntu.com/security/notices/USN-6407-1
https://ubuntu.com/security/notices/USN-6407-2
https://ubuntu.com/security/notices/USN-6408-1
https://ubuntu.com/security/notices/USN-6408-2
https://www.cve.org/CVERecord?id=CVE-2023-43786
|
| libX11-common |
CVE-2023-43787 |
MEDIUM |
1.6.7-4.el7_9 |
|
http://www.openwall.com/lists/oss-security/2024/01/24/9
https://access.redhat.com/security/cve/CVE-2023-43787
https://bugzilla.redhat.com/show_bug.cgi?id=2242254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787
https://jfrog.com/blog/xorg-libx11-vulns-cve-2023-43786-cve-2023-43787-part-two/
https://nvd.nist.gov/vuln/detail/CVE-2023-43787
https://security.netapp.com/advisory/ntap-20231103-0006/
https://ubuntu.com/security/notices/USN-6407-1
https://ubuntu.com/security/notices/USN-6407-2
https://ubuntu.com/security/notices/USN-6408-1
https://ubuntu.com/security/notices/USN-6408-2
https://www.cve.org/CVERecord?id=CVE-2023-43787
|
| libX11-common |
CVE-2016-7942 |
LOW |
1.6.7-4.el7_9 |
|
http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93363
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7942
https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://nvd.nist.gov/vuln/detail/CVE-2016-7942
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-3758-1
https://ubuntu.com/security/notices/USN-3758-2
https://usn.ubuntu.com/3758-1/
https://usn.ubuntu.com/3758-2/
https://www.cve.org/CVERecord?id=CVE-2016-7942
|
| libX11-common |
CVE-2022-3555 |
LOW |
1.6.7-4.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-3555
https://nvd.nist.gov/vuln/detail/CVE-2022-3555
https://ubuntu.com/security/CVE-2022-3555
https://www.cve.org/CVERecord?id=CVE-2022-3555
|
| libXi |
CVE-2016-7945 |
MEDIUM |
1.7.9-1.el7 |
|
http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93364
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7945
https://cgit.freedesktop.org/xorg/lib/libXi/commit/?id=19a9cd607de73947fcfb104682f203ffe4e1f4e5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3NTWIWSQ575GREBVAOUQUIMDL5CDVGP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVTZ2XLPKLASQUIQA2GMKKAUOQIUMM7I/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://nvd.nist.gov/vuln/detail/CVE-2016-7945
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-5646-1
https://www.cve.org/CVERecord?id=CVE-2016-7945
|
| libXi |
CVE-2016-7946 |
LOW |
1.7.9-1.el7 |
|
http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93374
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7946
https://cgit.freedesktop.org/xorg/lib/libXi/commit/?id=19a9cd607de73947fcfb104682f203ffe4e1f4e5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3NTWIWSQ575GREBVAOUQUIMDL5CDVGP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVTZ2XLPKLASQUIQA2GMKKAUOQIUMM7I/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://nvd.nist.gov/vuln/detail/CVE-2016-7946
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-5646-1
https://www.cve.org/CVERecord?id=CVE-2016-7946
|
| libXrender |
CVE-2016-7949 |
MEDIUM |
0.9.10-1.el7 |
|
http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93366
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7949
https://cgit.freedesktop.org/xorg/lib/libXrender/commit/?id=9362c7ddd1af3b168953d0737877bc52d79c94f4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WCKZFMZ76APAVMIRCUKKHEB4GAS7ZUP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHUT5YOSWVMBJNWZGUQNZRBFIZKRM4A6/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://nvd.nist.gov/vuln/detail/CVE-2016-7949
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-5436-1
https://www.cve.org/CVERecord?id=CVE-2016-7949
|
| libXrender |
CVE-2016-7950 |
MEDIUM |
0.9.10-1.el7 |
|
http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93369
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7950
https://cgit.freedesktop.org/xorg/lib/libXrender/commit/?id=8fad00b0b647ee662ce4737ca15be033b7a21714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WCKZFMZ76APAVMIRCUKKHEB4GAS7ZUP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZHUT5YOSWVMBJNWZGUQNZRBFIZKRM4A6/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://nvd.nist.gov/vuln/detail/CVE-2016-7950
https://security.gentoo.org/glsa/201704-03
https://ubuntu.com/security/notices/USN-5436-1
https://www.cve.org/CVERecord?id=CVE-2016-7950
|
| libXtst |
CVE-2016-7951 |
MEDIUM |
1.2.3-1.el7 |
|
http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93370
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7951
https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFLHX7WNEUXXDAGR324T35L5P6RRR7GE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVEUZRHYY3AJEKMFQ4DS7DX3Y2AICFP7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://nvd.nist.gov/vuln/detail/CVE-2016-7951
https://www.cve.org/CVERecord?id=CVE-2016-7951
|
| libXtst |
CVE-2016-7952 |
MEDIUM |
1.2.3-1.el7 |
|
http://www.openwall.com/lists/oss-security/2016/10/04/2
http://www.openwall.com/lists/oss-security/2016/10/04/4
http://www.securityfocus.com/bid/93375
http://www.securitytracker.com/id/1036945
https://access.redhat.com/security/cve/CVE-2016-7952
https://cgit.freedesktop.org/xorg/lib/libXtst/commit/?id=9556ad67af3129ec4a7a4f4b54a0d59701beeae3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFLHX7WNEUXXDAGR324T35L5P6RRR7GE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVEUZRHYY3AJEKMFQ4DS7DX3Y2AICFP7/
https://lists.x.org/archives/xorg-announce/2016-October/002720.html
https://nvd.nist.gov/vuln/detail/CVE-2016-7952
https://www.cve.org/CVERecord?id=CVE-2016-7952
|
| libblkid |
CVE-2014-9114 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
http://www.openwall.com/lists/oss-security/2014/11/26/13
http://www.openwall.com/lists/oss-security/2014/11/26/21
http://www.securityfocus.com/bid/71327
https://access.redhat.com/security/cve/CVE-2014-9114
https://bugzilla.redhat.com/show_bug.cgi?id=1168485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114
https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-9114
https://security.gentoo.org/glsa/201612-14
https://www.cve.org/CVERecord?id=CVE-2014-9114
|
| libblkid |
CVE-2016-2779 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://nvd.nist.gov/vuln/detail/CVE-2016-2779
https://www.cve.org/CVERecord?id=CVE-2016-2779
|
| libblkid |
CVE-2020-21583 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-21583
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21583
https://nvd.nist.gov/vuln/detail/CVE-2020-21583
https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html
https://www.cve.org/CVERecord?id=CVE-2020-21583
|
| libblkid |
CVE-2022-0563 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
|
| libblkid |
CVE-2015-5218 |
LOW |
2.23.2-65.el7_9.1 |
|
http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
http://www.spinics.net/lists/util-linux-ng/msg11873.html
https://access.redhat.com/security/cve/CVE-2015-5218
https://bugzilla.redhat.com/show_bug.cgi?id=1259322
https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
https://nvd.nist.gov/vuln/detail/CVE-2015-5218
https://www.cve.org/CVERecord?id=CVE-2015-5218
https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
|
| libblkid |
CVE-2021-37600 |
LOW |
2.23.2-65.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2021-37600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20210902-0002/
https://www.cve.org/CVERecord?id=CVE-2021-37600
|
| libcap |
CVE-2023-2603 |
MEDIUM |
2.22-11.el7 |
|
https://access.redhat.com/errata/RHSA-2023:5071
https://access.redhat.com/security/cve/CVE-2023-2603
https://bugzilla.redhat.com/2209113
https://bugzilla.redhat.com/2209114
https://bugzilla.redhat.com/show_bug.cgi?id=2209113
https://bugzilla.redhat.com/show_bug.cgi?id=2209114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2603
https://errata.almalinux.org/9/ALSA-2023-5071.html
https://errata.rockylinux.org/RLSA-2023:4524
https://linux.oracle.com/cve/CVE-2023-2603.html
https://linux.oracle.com/errata/ELSA-2023-5071.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/
https://nvd.nist.gov/vuln/detail/CVE-2023-2603
https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.iuvg7sbjg8pe
https://ubuntu.com/security/notices/USN-6166-1
https://ubuntu.com/security/notices/USN-6166-2
https://www.cve.org/CVERecord?id=CVE-2023-2603
https://www.openwall.com/lists/oss-security/2023/05/15/4
https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf
|
| libcap |
CVE-2023-2602 |
LOW |
2.22-11.el7 |
|
https://access.redhat.com/errata/RHSA-2023:5071
https://access.redhat.com/security/cve/CVE-2023-2602
https://bugzilla.redhat.com/2209113
https://bugzilla.redhat.com/2209114
https://bugzilla.redhat.com/show_bug.cgi?id=2209113
https://bugzilla.redhat.com/show_bug.cgi?id=2209114
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2602
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2603
https://errata.almalinux.org/9/ALSA-2023-5071.html
https://errata.rockylinux.org/RLSA-2023:4524
https://linux.oracle.com/cve/CVE-2023-2602.html
https://linux.oracle.com/errata/ELSA-2023-5071.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/
https://nvd.nist.gov/vuln/detail/CVE-2023-2602
https://sites.google.com/site/fullycapable/release-notes-for-libcap#h.iuvg7sbjg8pe
https://ubuntu.com/security/notices/USN-6166-1
https://www.cve.org/CVERecord?id=CVE-2023-2602
https://www.openwall.com/lists/oss-security/2023/05/15/4
https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf
|
| libcom_err |
CVE-2015-0247 |
MEDIUM |
1.42.9-19.el7 |
|
http://advisories.mageia.org/MGASA-2015-0061.html
http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:045
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.ocert.org/advisories/ocert-2015-002.html
http://www.securityfocus.com/archive/1/534633/100/0/threaded
http://www.securityfocus.com/bid/72520
http://www.ubuntu.com/usn/USN-2507-1
https://access.redhat.com/security/cve/CVE-2015-0247
https://bugzilla.redhat.com/show_bug.cgi?id=1187032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247
https://exchange.xforce.ibmcloud.com/vulnerabilities/100740
https://nvd.nist.gov/vuln/detail/CVE-2015-0247
https://security.gentoo.org/glsa/201701-06
https://ubuntu.com/security/notices/USN-2507-1
https://www.cve.org/CVERecord?id=CVE-2015-0247
|
| libcom_err |
CVE-2022-1304 |
MEDIUM |
1.42.9-19.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8361
https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/2069726
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://errata.almalinux.org/9/ALSA-2022-8361.html
https://errata.rockylinux.org/RLSA-2022:8361
https://linux.oracle.com/cve/CVE-2022-1304.html
https://linux.oracle.com/errata/ELSA-2022-8361.html
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
https://www.cve.org/CVERecord?id=CVE-2022-1304
|
| libcom_err |
CVE-2015-1572 |
LOW |
1.42.9-19.el7 |
|
http://advisories.mageia.org/MGASA-2015-0088.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.mandriva.com/security/advisories?name=MDVSA-2015:068
http://www.securityfocus.com/bid/72709
http://www.ubuntu.com/usn/USN-2507-1
https://access.redhat.com/security/cve/CVE-2015-1572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572
https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73
https://nvd.nist.gov/vuln/detail/CVE-2015-1572
https://security.gentoo.org/glsa/201507-22
https://ubuntu.com/security/notices/USN-2507-1
https://www.cve.org/CVERecord?id=CVE-2015-1572
|
| libcurl |
CVE-2015-3153 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://curl.haxx.se/docs/adv_20150429.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html
http://www.debian.org/security/2015/dsa-3240
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
http://www.securityfocus.com/bid/74408
http://www.securitytracker.com/id/1032233
http://www.ubuntu.com/usn/USN-2591-1
https://access.redhat.com/security/cve/CVE-2015-3153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153
https://kc.mcafee.com/corporate/index?page=content&id=SB10131
https://nvd.nist.gov/vuln/detail/CVE-2015-3153
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2591-1
https://www.cve.org/CVERecord?id=CVE-2015-3153
|
| libcurl |
CVE-2016-8615 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94096
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8615
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615
https://curl.haxx.se/CVE-2016-8615.patch
https://curl.haxx.se/docs/adv_20161102A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
https://linux.oracle.com/cve/CVE-2016-8615.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8615
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8615
https://www.tenable.com/security/tns-2016-21
|
| libcurl |
CVE-2016-8617 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94097
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8617
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617
https://curl.haxx.se/CVE-2016-8617.patch
https://curl.haxx.se/docs/adv_20161102C.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
https://linux.oracle.com/cve/CVE-2016-8617.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8617
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8617
https://www.tenable.com/security/tns-2016-21
|
| libcurl |
CVE-2016-8618 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94098
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8618
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618
https://curl.haxx.se/docs/adv_20161102D.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
https://linux.oracle.com/cve/CVE-2016-8618.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8618
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8618
https://www.tenable.com/security/tns-2016-21
|
| libcurl |
CVE-2016-8619 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94100
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8619
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619
https://curl.haxx.se/CVE-2016-8619.patch
https://curl.haxx.se/docs/adv_20161102E.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
https://linux.oracle.com/cve/CVE-2016-8619.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8619
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8619
https://www.tenable.com/security/tns-2016-21
|
| libcurl |
CVE-2016-8624 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94103
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8624
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624
https://curl.haxx.se/docs/adv_20161102J.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
https://linux.oracle.com/cve/CVE-2016-8624.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8624
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8624
https://www.tenable.com/security/tns-2016-21
|
| libcurl |
CVE-2016-8625 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.securityfocus.com/bid/94107
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8625
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625
https://curl.haxx.se/CVE-2016-8625.patch
https://curl.haxx.se/docs/adv_20161102K.html
https://linux.oracle.com/cve/CVE-2016-8625.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8625
https://security.gentoo.org/glsa/201701-47
https://www.cve.org/CVERecord?id=CVE-2016-8625
https://www.tenable.com/security/tns-2016-21
|
| libcurl |
CVE-2017-1000254 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/101115
http://www.securitytracker.com/id/1039509
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000254
https://curl.haxx.se/673d0cd8.patch
https://curl.haxx.se/docs/adv_20171004.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-1000254
https://security.gentoo.org/glsa/201712-04
https://support.apple.com/HT208331
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
https://www.cve.org/CVERecord?id=CVE-2017-1000254
|
| libcurl |
CVE-2017-8817 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://security.cucumberlinux.com/security/details.php?id=162
http://www.securityfocus.com/bid/102057
http://www.securitytracker.com/id/1039897
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-8817
https://curl.haxx.se/docs/adv_2017-ae72.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
https://nvd.nist.gov/vuln/detail/CVE-2017-8817
https://security.gentoo.org/glsa/201712-04
https://ubuntu.com/security/notices/USN-3498-1
https://ubuntu.com/security/notices/USN-3498-2
https://www.cve.org/CVERecord?id=CVE-2017-8817
https://www.debian.org/security/2017/dsa-4051
|
| libcurl |
CVE-2020-8284 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2020-8284
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2020-8284.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
https://hackerone.com/reports/1040166
https://linux.oracle.com/cve/CVE-2020-8284.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://nvd.nist.gov/vuln/detail/CVE-2020-8284
https://security.gentoo.org/glsa/202012-14
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
https://ubuntu.com/security/notices/USN-4665-1
https://ubuntu.com/security/notices/USN-4665-2
https://www.cve.org/CVERecord?id=CVE-2020-8284
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| libcurl |
CVE-2020-8285 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2021/Apr/51
https://access.redhat.com/security/cve/CVE-2020-8285
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2020-8285.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
https://github.com/curl/curl/issues/6255
https://hackerone.com/reports/1045844
https://linux.oracle.com/cve/CVE-2020-8285.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://nvd.nist.gov/vuln/detail/CVE-2020-8285
https://security.gentoo.org/glsa/202012-14
https://security.netapp.com/advisory/ntap-20210122-0007/
https://support.apple.com/kb/HT212325
https://support.apple.com/kb/HT212326
https://support.apple.com/kb/HT212327
https://ubuntu.com/security/notices/USN-4665-1
https://ubuntu.com/security/notices/USN-4665-2
https://www.cve.org/CVERecord?id=CVE-2020-8285
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| libcurl |
CVE-2021-22876 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2021-22876
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22876.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1101882
https://linux.oracle.com/cve/CVE-2021-22876.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
https://nvd.nist.gov/vuln/detail/CVE-2021-22876
https://security.gentoo.org/glsa/202105-36
https://security.netapp.com/advisory/ntap-20210521-0007/
https://ubuntu.com/security/notices/USN-4898-1
https://ubuntu.com/security/notices/USN-4903-1
https://www.cve.org/CVERecord?id=CVE-2021-22876
https://www.oracle.com//security-alerts/cpujul2021.html
|
| libcurl |
CVE-2021-22924 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2021-22924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
https://curl.se/docs/CVE-2021-22924.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
https://hackerone.com/reports/1223565
https://linux.oracle.com/cve/CVE-2021-22924.html
https://linux.oracle.com/errata/ELSA-2021-3582.html
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22924
https://security.netapp.com/advisory/ntap-20210902-0003/
https://ubuntu.com/security/notices/USN-5021-1
https://www.cve.org/CVERecord?id=CVE-2021-22924
https://www.debian.org/security/2022/dsa-5197
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libcurl |
CVE-2021-22946 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
https://access.redhat.com/security/cve/CVE-2021-22946
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22946.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
https://hackerone.com/reports/1334111
https://linux.oracle.com/cve/CVE-2021-22946.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22946
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20211029-0003/
https://security.netapp.com/advisory/ntap-20220121-0008/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://www.cve.org/CVERecord?id=CVE-2021-22946
https://www.debian.org/security/2022/dsa-5197
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libcurl |
CVE-2021-22947 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2022/Mar/29
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
https://access.redhat.com/security/cve/CVE-2021-22947
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22947.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
https://hackerone.com/reports/1334763
https://launchpad.net/bugs/1944120 (regression bug)
https://linux.oracle.com/cve/CVE-2021-22947.html
https://linux.oracle.com/errata/ELSA-2021-4059.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://nvd.nist.gov/vuln/detail/CVE-2021-22947
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20211029-0003/
https://support.apple.com/kb/HT213183
https://ubuntu.com/security/notices/USN-5079-1
https://ubuntu.com/security/notices/USN-5079-2
https://ubuntu.com/security/notices/USN-5079-3
https://ubuntu.com/security/notices/USN-5079-4
https://www.cve.org/CVERecord?id=CVE-2021-22947
https://www.debian.org/security/2022/dsa-5197
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libcurl |
CVE-2022-27774 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/errata/RHSA-2022:5313
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json
https://access.redhat.com/security/cve/CVE-2022-27774
https://bugzilla.redhat.com/2077541
https://bugzilla.redhat.com/2077547
https://bugzilla.redhat.com/2078408
https://bugzilla.redhat.com/2082215
https://curl.se/docs/CVE-2022-27774.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
https://errata.almalinux.org/8/ALSA-2022-5313.html
https://hackerone.com/reports/1543773
https://linux.oracle.com/cve/CVE-2022-27774.html
https://linux.oracle.com/errata/ELSA-2022-5313.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
https://nvd.nist.gov/vuln/detail/CVE-2022-27774
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
https://www.cve.org/CVERecord?id=CVE-2022-27774
https://www.debian.org/security/2022/dsa-5197
|
| libcurl |
CVE-2022-27776 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/errata/RHSA-2022:5313
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json
https://access.redhat.com/security/cve/CVE-2022-27776
https://bugzilla.redhat.com/2077541
https://bugzilla.redhat.com/2077547
https://bugzilla.redhat.com/2078408
https://bugzilla.redhat.com/2082215
https://curl.se/docs/CVE-2022-27776.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
https://errata.almalinux.org/8/ALSA-2022-5313.html
https://hackerone.com/reports/1547048
https://linux.oracle.com/cve/CVE-2022-27776.html
https://linux.oracle.com/errata/ELSA-2022-5313.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
https://nvd.nist.gov/vuln/detail/CVE-2022-27776
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0008/
https://ubuntu.com/security/notices/USN-5397-1
https://www.cve.org/CVERecord?id=CVE-2022-27776
https://www.debian.org/security/2022/dsa-5197
|
| libcurl |
CVE-2022-27778 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2022-27778
https://curl.se/docs/CVE-2022-27778.html
https://hackerone.com/reports/1553598
https://nvd.nist.gov/vuln/detail/CVE-2022-27778
https://security.netapp.com/advisory/ntap-20220609-0009/
https://security.netapp.com/advisory/ntap-20220729-0004/
https://www.cve.org/CVERecord?id=CVE-2022-27778
https://www.oracle.com/security-alerts/cpujul2022.html
|
| libcurl |
CVE-2022-27779 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2022-27779
https://curl.se/docs/CVE-2022-27779.html
https://hackerone.com/reports/1553301
https://nvd.nist.gov/vuln/detail/CVE-2022-27779
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0009/
https://www.cve.org/CVERecord?id=CVE-2022-27779
|
| libcurl |
CVE-2022-27780 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2022-27780
https://curl.se/docs/CVE-2022-27780.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780
https://hackerone.com/reports/1553841
https://nvd.nist.gov/vuln/detail/CVE-2022-27780
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
https://www.cve.org/CVERecord?id=CVE-2022-27780
|
| libcurl |
CVE-2022-27782 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.openwall.com/lists/oss-security/2023/03/20/6
https://access.redhat.com/errata/RHSA-2022:5313
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json
https://access.redhat.com/security/cve/CVE-2022-27782
https://bugzilla.redhat.com/2077541
https://bugzilla.redhat.com/2077547
https://bugzilla.redhat.com/2078408
https://bugzilla.redhat.com/2082215
https://curl.se/docs/CVE-2022-27782.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
https://errata.almalinux.org/8/ALSA-2022-5313.html
https://hackerone.com/reports/1555796
https://linux.oracle.com/cve/CVE-2022-27782.html
https://linux.oracle.com/errata/ELSA-2022-5313.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-27782
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
https://www.cve.org/CVERecord?id=CVE-2022-27782
https://www.debian.org/security/2022/dsa-5197
|
| libcurl |
CVE-2022-30115 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://www.openwall.com/lists/oss-security/2022/10/26/4
http://www.openwall.com/lists/oss-security/2022/12/21/1
https://access.redhat.com/security/cve/CVE-2022-30115
https://curl.se/docs/CVE-2022-30115.html
https://hackerone.com/reports/1557449
https://nvd.nist.gov/vuln/detail/CVE-2022-30115
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0009/
https://www.cve.org/CVERecord?id=CVE-2022-30115
|
| libcurl |
CVE-2022-32208 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
https://access.redhat.com/errata/RHSA-2022:6157
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json
https://access.redhat.com/security/cve/CVE-2022-32208
https://bugzilla.redhat.com/2099300
https://bugzilla.redhat.com/2099305
https://bugzilla.redhat.com/2099306
https://curl.se/docs/CVE-2022-32208.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
https://errata.almalinux.org/9/ALSA-2022-6157.html
https://hackerone.com/reports/1590071
https://linux.oracle.com/cve/CVE-2022-32208.html
https://linux.oracle.com/errata/ELSA-2022-6159.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
https://nvd.nist.gov/vuln/detail/CVE-2022-32208
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220915-0003/
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5495-1
https://ubuntu.com/security/notices/USN-5499-1
https://www.cve.org/CVERecord?id=CVE-2022-32208
https://www.debian.org/security/2022/dsa-5197
|
| libcurl |
CVE-2022-43551 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2022-43551
https://curl.se/docs/CVE-2022-43551.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551
https://hackerone.com/reports/1755083
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/
https://nvd.nist.gov/vuln/detail/CVE-2022-43551
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230427-0007/
https://ubuntu.com/security/notices/USN-5788-1
https://www.cve.org/CVERecord?id=CVE-2022-43551
|
| libcurl |
CVE-2023-27535 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/errata/RHSA-2023:2650
https://access.redhat.com/security/cve/CVE-2023-27535
https://bugzilla.redhat.com/2179073
https://bugzilla.redhat.com/show_bug.cgi?id=2179073
https://bugzilla.redhat.com/show_bug.cgi?id=2188029
https://curl.se/docs/CVE-2023-27535.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535
https://errata.almalinux.org/9/ALSA-2023-2650.html
https://errata.rockylinux.org/RLSA-2023:3106
https://hackerone.com/reports/1892780
https://linux.oracle.com/cve/CVE-2023-27535.html
https://linux.oracle.com/errata/ELSA-2023-3106.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://nvd.nist.gov/vuln/detail/CVE-2023-27535
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0010/
https://ubuntu.com/security/notices/USN-5964-1
https://ubuntu.com/security/notices/USN-5964-2
https://www.cve.org/CVERecord?id=CVE-2023-27535
|
| libcurl |
CVE-2023-27536 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/errata/RHSA-2023:6679
https://access.redhat.com/security/cve/CVE-2023-27536
https://bugzilla.redhat.com/2179062
https://bugzilla.redhat.com/2179069
https://bugzilla.redhat.com/2179092
https://bugzilla.redhat.com/2179103
https://bugzilla.redhat.com/show_bug.cgi?id=2179092
https://bugzilla.redhat.com/show_bug.cgi?id=2196786
https://curl.se/docs/CVE-2023-27536.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321
https://errata.almalinux.org/9/ALSA-2023-6679.html
https://errata.rockylinux.org/RLSA-2023:4523
https://hackerone.com/reports/1895135
https://linux.oracle.com/cve/CVE-2023-27536.html
https://linux.oracle.com/errata/ELSA-2023-6679.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://nvd.nist.gov/vuln/detail/CVE-2023-27536
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0010/
https://ubuntu.com/security/notices/USN-5964-1
https://ubuntu.com/security/notices/USN-5964-2
https://www.cve.org/CVERecord?id=CVE-2023-27536
|
| libcurl |
CVE-2023-27538 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/errata/RHSA-2023:6679
https://access.redhat.com/security/cve/CVE-2023-27538
https://bugzilla.redhat.com/2179062
https://bugzilla.redhat.com/2179069
https://bugzilla.redhat.com/2179092
https://bugzilla.redhat.com/2179103
https://curl.se/docs/CVE-2023-27538.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538
https://errata.almalinux.org/9/ALSA-2023-6679.html
https://hackerone.com/reports/1898475
https://linux.oracle.com/cve/CVE-2023-27538.html
https://linux.oracle.com/errata/ELSA-2023-6679.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://nvd.nist.gov/vuln/detail/CVE-2023-27538
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0010/
https://ubuntu.com/security/notices/USN-5964-1
https://www.cve.org/CVERecord?id=CVE-2023-27538
|
| libcurl |
CVE-2023-28321 |
MEDIUM |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://access.redhat.com/errata/RHSA-2023:4354
https://access.redhat.com/security/cve/CVE-2023-28321
https://bugzilla.redhat.com/2196786
https://bugzilla.redhat.com/2196793
https://bugzilla.redhat.com/show_bug.cgi?id=2179092
https://bugzilla.redhat.com/show_bug.cgi?id=2196786
https://curl.se/docs/CVE-2023-28321.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321
https://errata.almalinux.org/9/ALSA-2023-4354.html
https://errata.rockylinux.org/RLSA-2023:4523
https://hackerone.com/reports/1950627
https://linux.oracle.com/cve/CVE-2023-28321.html
https://linux.oracle.com/errata/ELSA-2023-4523.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
https://nvd.nist.gov/vuln/detail/CVE-2023-28321
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230609-0009/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6237-1
https://ubuntu.com/security/notices/USN-6237-3
https://www.cve.org/CVERecord?id=CVE-2023-28321
|
| libcurl |
CVE-2016-0755 |
LOW |
7.29.0-59.el7_9.2 |
|
http://curl.haxx.se/docs/adv_20160127A.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
http://www.debian.org/security/2016/dsa-3455
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/82307
http://www.securitytracker.com/id/1034882
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
http://www.ubuntu.com/usn/USN-2882-1
https://access.redhat.com/security/cve/CVE-2016-0755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
https://nvd.nist.gov/vuln/detail/CVE-2016-0755
https://security.gentoo.org/glsa/201701-47
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-2882-1
https://www.cve.org/CVERecord?id=CVE-2016-0755
|
| libcurl |
CVE-2016-8616 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94094
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8616
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616
https://curl.haxx.se/CVE-2016-8616.patch
https://curl.haxx.se/docs/adv_20161102B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
https://linux.oracle.com/cve/CVE-2016-8616.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8616
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8616
https://www.tenable.com/security/tns-2016-21
|
| libcurl |
CVE-2016-8621 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94101
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8621
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621
https://curl.haxx.se/CVE-2016-8621.patch
https://curl.haxx.se/docs/adv_20161102G.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
https://linux.oracle.com/cve/CVE-2016-8621.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8621
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8621
https://www.tenable.com/security/tns-2016-21
|
| libcurl |
CVE-2016-8622 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94105
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8622
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622
https://curl.haxx.se/docs/adv_20161102H.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
https://linux.oracle.com/cve/CVE-2016-8622.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://nvd.nist.gov/vuln/detail/CVE-2016-8622
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8622
https://www.tenable.com/security/tns-2016-21
|
| libcurl |
CVE-2016-8623 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/94106
http://www.securitytracker.com/id/1037192
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-8623
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623
https://curl.haxx.se/CVE-2016-8623.patch
https://curl.haxx.se/docs/adv_20161102I.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
https://linux.oracle.com/cve/CVE-2016-8623.html
https://linux.oracle.com/errata/ELSA-2019-4652.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8623
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3123-1
https://www.cve.org/CVERecord?id=CVE-2016-8623
https://www.tenable.com/security/tns-2016-21
|
| libcurl |
CVE-2016-9586 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/95019
http://www.securitytracker.com/id/1037515
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2016-9586
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
https://curl.haxx.se/docs/adv_20161221A.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2016-9586
https://security.gentoo.org/glsa/201701-47
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
https://www.cve.org/CVERecord?id=CVE-2016-9586
|
| libcurl |
CVE-2017-1000100 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.debian.org/security/2017/dsa-3992
http://www.securityfocus.com/bid/100286
http://www.securitytracker.com/id/1039118
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-1000100
https://curl.haxx.se/docs/adv_20170809B.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
https://nvd.nist.gov/vuln/detail/CVE-2017-1000100
https://security.gentoo.org/glsa/201709-14
https://support.apple.com/HT208221
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
https://www.cve.org/CVERecord?id=CVE-2017-1000100
|
| libcurl |
CVE-2017-7407 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
https://access.redhat.com/errata/RHSA-2018:3558
https://access.redhat.com/security/cve/CVE-2017-7407
https://curl.haxx.se/docs/adv_20170403.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
https://nvd.nist.gov/vuln/detail/CVE-2017-7407
https://security.gentoo.org/glsa/201709-14
https://ubuntu.com/security/notices/USN-3441-1
https://ubuntu.com/security/notices/USN-3441-2
https://www.cve.org/CVERecord?id=CVE-2017-7407
|
| libcurl |
CVE-2018-20483 |
LOW |
7.29.0-59.el7_9.2 |
|
http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS
http://www.securityfocus.com/bid/106358
https://access.redhat.com/errata/RHSA-2019:3701
https://access.redhat.com/security/cve/CVE-2018-20483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483
https://linux.oracle.com/cve/CVE-2018-20483.html
https://linux.oracle.com/errata/ELSA-2019-3701.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20483
https://security.gentoo.org/glsa/201903-08
https://security.netapp.com/advisory/ntap-20190321-0002/
https://twitter.com/marcan42/status/1077676739877232640
https://ubuntu.com/security/notices/USN-3943-1
https://usn.ubuntu.com/3943-1/
https://www.cve.org/CVERecord?id=CVE-2018-20483
|
| libcurl |
CVE-2020-8231 |
LOW |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2020-8231
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.haxx.se/docs/CVE-2020-8231.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
https://hackerone.com/reports/948876
https://linux.oracle.com/cve/CVE-2020-8231.html
https://linux.oracle.com/errata/ELSA-2021-1610.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-8231
https://security.gentoo.org/glsa/202012-14
https://ubuntu.com/security/notices/USN-4466-1
https://ubuntu.com/security/notices/USN-4466-2
https://ubuntu.com/security/notices/USN-4665-1
https://www.cve.org/CVERecord?id=CVE-2020-8231
https://www.debian.org/security/2021/dsa-4881
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libcurl |
CVE-2021-22898 |
LOW |
7.29.0-59.el7_9.2 |
|
http://www.openwall.com/lists/oss-security/2021/07/21/4
https://access.redhat.com/security/cve/CVE-2021-22898
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://curl.se/docs/CVE-2021-22898.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
https://hackerone.com/reports/1176461
https://linux.oracle.com/cve/CVE-2021-22898.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://nvd.nist.gov/vuln/detail/CVE-2021-22898
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://ubuntu.com/security/notices/USN-5894-1
https://www.cve.org/CVERecord?id=CVE-2021-22898
https://www.debian.org/security/2022/dsa-5197
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
|
| libcurl |
CVE-2021-22925 |
LOW |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2021/Sep/39
http://seclists.org/fulldisclosure/2021/Sep/40
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
https://access.redhat.com/security/cve/CVE-2021-22925
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
https://curl.se/docs/CVE-2021-22925.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925
https://errata.almalinux.org/8/ALSA-2021-4511.html
https://hackerone.com/reports/1223882
https://linux.oracle.com/cve/CVE-2021-22925.html
https://linux.oracle.com/errata/ELSA-2021-4511.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://nvd.nist.gov/vuln/detail/CVE-2021-22925
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20210902-0003/
https://support.apple.com/kb/HT212804
https://support.apple.com/kb/HT212805
https://ubuntu.com/security/notices/USN-5021-1
https://ubuntu.com/security/notices/USN-5021-2
https://ubuntu.com/security/notices/USN-5894-1
https://www.cve.org/CVERecord?id=CVE-2021-22925
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libcurl |
CVE-2022-27781 |
LOW |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/security/cve/CVE-2022-27781
https://curl.se/docs/CVE-2022-27781.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
https://github.com/curl/curl/commit/f6c335d63f
https://hackerone.com/reports/1555441
https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-27781
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220609-0009/
https://ubuntu.com/security/notices/USN-5412-1
https://ubuntu.com/security/notices/USN-5499-1
https://www.cve.org/CVERecord?id=CVE-2022-27781
https://www.debian.org/security/2022/dsa-5197
|
| libcurl |
CVE-2022-35252 |
LOW |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2023/Jan/20
http://seclists.org/fulldisclosure/2023/Jan/21
https://access.redhat.com/errata/RHSA-2023:2478
https://access.redhat.com/security/cve/CVE-2022-35252
https://bugzilla.redhat.com/2120718
https://bugzilla.redhat.com/2152652
https://curl.se/docs/CVE-2022-35252.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252
https://errata.almalinux.org/9/ALSA-2023-2478.html
https://hackerone.com/reports/1613943
https://linux.oracle.com/cve/CVE-2022-35252.html
https://linux.oracle.com/errata/ELSA-2023-2963.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
https://nvd.nist.gov/vuln/detail/CVE-2022-35252
https://security.gentoo.org/glsa/202212-01
https://security.netapp.com/advisory/ntap-20220930-0005/
https://support.apple.com/kb/HT213603
https://support.apple.com/kb/HT213604
https://ubuntu.com/security/notices/USN-5587-1
https://www.cve.org/CVERecord?id=CVE-2022-35252
https://www.openwall.com/lists/oss-security/2022/08/31/2
|
| libcurl |
CVE-2023-27534 |
LOW |
7.29.0-59.el7_9.2 |
|
https://access.redhat.com/errata/RHSA-2023:6679
https://access.redhat.com/security/cve/CVE-2023-27534
https://bugzilla.redhat.com/2179062
https://bugzilla.redhat.com/2179069
https://bugzilla.redhat.com/2179092
https://bugzilla.redhat.com/2179103
https://curl.se/docs/CVE-2023-27534.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534
https://errata.almalinux.org/9/ALSA-2023-6679.html
https://hackerone.com/reports/1892351
https://linux.oracle.com/cve/CVE-2023-27534.html
https://linux.oracle.com/errata/ELSA-2023-6679.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://nvd.nist.gov/vuln/detail/CVE-2023-27534
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0012/
https://ubuntu.com/security/notices/USN-5964-1
https://www.cve.org/CVERecord?id=CVE-2023-27534
|
| libcurl |
CVE-2023-28322 |
LOW |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://access.redhat.com/errata/RHSA-2023:4354
https://access.redhat.com/security/cve/CVE-2023-28322
https://bugzilla.redhat.com/2196786
https://bugzilla.redhat.com/2196793
https://curl.se/docs/CVE-2023-28322.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322
https://errata.almalinux.org/9/ALSA-2023-4354.html
https://hackerone.com/reports/1954658
https://linux.oracle.com/cve/CVE-2023-28322.html
https://linux.oracle.com/errata/ELSA-2023-4354.html
https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
https://nvd.nist.gov/vuln/detail/CVE-2023-28322
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230609-0009/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6237-1
https://ubuntu.com/security/notices/USN-6237-3
https://www.cve.org/CVERecord?id=CVE-2023-28322
|
| libcurl |
CVE-2023-38546 |
LOW |
7.29.0-59.el7_9.2 |
|
http://seclists.org/fulldisclosure/2024/Jan/34
http://seclists.org/fulldisclosure/2024/Jan/37
http://seclists.org/fulldisclosure/2024/Jan/38
https://access.redhat.com/errata/RHSA-2023:6745
https://access.redhat.com/security/cve/CVE-2023-38546
https://bugzilla.redhat.com/2241933
https://bugzilla.redhat.com/2241938
https://bugzilla.redhat.com/show_bug.cgi?id=2241933
https://bugzilla.redhat.com/show_bug.cgi?id=2241938
https://curl.se/docs/CVE-2023-38546.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546
https://errata.almalinux.org/9/ALSA-2023-6745.html
https://errata.rockylinux.org/RLSA-2023:5763
https://linux.oracle.com/cve/CVE-2023-38546.html
https://linux.oracle.com/errata/ELSA-2023-6745.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
https://nvd.nist.gov/vuln/detail/CVE-2023-38546
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214057
https://support.apple.com/kb/HT214058
https://support.apple.com/kb/HT214063
https://ubuntu.com/security/notices/USN-6429-1
https://ubuntu.com/security/notices/USN-6429-2
https://ubuntu.com/security/notices/USN-6429-3
https://www.cve.org/CVERecord?id=CVE-2023-38546
|
| libdb |
CVE-2017-10140 |
MEDIUM |
5.3.21-25.el7 |
|
http://seclists.org/oss-sec/2017/q3/285
http://www.openwall.com/lists/oss-security/2017/08/12/1
http://www.postfix.org/announcements/postfix-3.2.2.html
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/security/cve/CVE-2017-10140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10140
https://nvd.nist.gov/vuln/detail/CVE-2017-10140
https://ubuntu.com/security/notices/USN-3489-1
https://ubuntu.com/security/notices/USN-3489-2
https://www.cve.org/CVERecord?id=CVE-2017-10140
https://www.oracle.com/security-alerts/cpujul2020.html
|
| libdb |
CVE-2019-2708 |
LOW |
5.3.21-25.el7 |
|
http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://access.redhat.com/security/cve/CVE-2019-2708
https://linux.oracle.com/cve/CVE-2019-2708.html
https://linux.oracle.com/errata/ELSA-2021-1675.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQFKX6NKU2DCW5CTCHQSOJJDFVRVTPO6/
https://nvd.nist.gov/vuln/detail/CVE-2019-2708
https://www.cve.org/CVERecord?id=CVE-2019-2708
|
| libdb-utils |
CVE-2017-10140 |
MEDIUM |
5.3.21-25.el7 |
|
http://seclists.org/oss-sec/2017/q3/285
http://www.openwall.com/lists/oss-security/2017/08/12/1
http://www.postfix.org/announcements/postfix-3.2.2.html
https://access.redhat.com/errata/RHSA-2019:0366
https://access.redhat.com/security/cve/CVE-2017-10140
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10140
https://nvd.nist.gov/vuln/detail/CVE-2017-10140
https://ubuntu.com/security/notices/USN-3489-1
https://ubuntu.com/security/notices/USN-3489-2
https://www.cve.org/CVERecord?id=CVE-2017-10140
https://www.oracle.com/security-alerts/cpujul2020.html
|
| libdb-utils |
CVE-2019-2708 |
LOW |
5.3.21-25.el7 |
|
http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://access.redhat.com/security/cve/CVE-2019-2708
https://linux.oracle.com/cve/CVE-2019-2708.html
https://linux.oracle.com/errata/ELSA-2021-1675.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OQFKX6NKU2DCW5CTCHQSOJJDFVRVTPO6/
https://nvd.nist.gov/vuln/detail/CVE-2019-2708
https://www.cve.org/CVERecord?id=CVE-2019-2708
|
| libevent |
CVE-2014-6272 |
MEDIUM |
2.0.21-4.el7 |
|
http://archives.seul.org/libevent/users/Jan-2015/msg00010.html
http://archives.seul.org/libevent/users/Jan-2015/msg00011.html
http://archives.seul.org/libevent/users/Jan-2015/msg00012.html
http://archives.seul.org/libevent/users/Jan-2015/msg00013.html
http://www.debian.org/security/2015/dsa-3119
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.366317
https://access.redhat.com/security/cve/CVE-2014-6272
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272
https://nvd.nist.gov/vuln/detail/CVE-2014-6272
https://puppet.com/security/cve/CVE-2014-6272
https://ubuntu.com/security/notices/USN-2477-1
https://www.cve.org/CVERecord?id=CVE-2014-6272
|
| libevent |
CVE-2015-6525 |
MEDIUM |
2.0.21-4.el7 |
|
http://archives.seul.org/libevent/users/Jan-2015/msg00010.html
http://www.debian.org/security/2015/dsa-3119
https://access.redhat.com/security/cve/CVE-2015-6525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6525
https://nvd.nist.gov/vuln/detail/CVE-2015-6525
https://ubuntu.com/security/notices/USN-2477-1
https://www.cve.org/CVERecord?id=CVE-2015-6525
|
| libevent |
CVE-2016-10195 |
MEDIUM |
2.0.21-4.el7 |
|
http://www.debian.org/security/2017/dsa-3789
http://www.openwall.com/lists/oss-security/2017/01/31/17
http://www.openwall.com/lists/oss-security/2017/02/02/7
http://www.securityfocus.com/bid/96014
http://www.securitytracker.com/id/1038320
https://access.redhat.com/errata/RHSA-2017:1104
https://access.redhat.com/errata/RHSA-2017:1106
https://access.redhat.com/errata/RHSA-2017:1201
https://access.redhat.com/security/cve/CVE-2016-10195
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10195
https://github.com/libevent/libevent/blob/release-2.1.6-beta/ChangeLog
https://github.com/libevent/libevent/commit/96f64a022014a208105ead6c8a7066018449d86d
https://github.com/libevent/libevent/issues/317
https://linux.oracle.com/cve/CVE-2016-10195.html
https://linux.oracle.com/errata/ELSA-2017-1201.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10195
https://security.gentoo.org/glsa/201705-01
https://ubuntu.com/security/notices/USN-3228-1
https://ubuntu.com/security/notices/USN-3278-1
https://www.cve.org/CVERecord?id=CVE-2016-10195
https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/
|
| libevent |
CVE-2016-10196 |
MEDIUM |
2.0.21-4.el7 |
|
http://www.debian.org/security/2017/dsa-3789
http://www.openwall.com/lists/oss-security/2017/01/31/17
http://www.openwall.com/lists/oss-security/2017/02/02/7
http://www.securityfocus.com/bid/96014
http://www.securitytracker.com/id/1038320
https://access.redhat.com/errata/RHSA-2017:1104
https://access.redhat.com/errata/RHSA-2017:1106
https://access.redhat.com/errata/RHSA-2017:1201
https://access.redhat.com/security/cve/CVE-2016-10196
https://bugzilla.mozilla.org/show_bug.cgi?id=1343453
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10196
https://github.com/libevent/libevent/blob/release-2.1.6-beta/ChangeLog
https://github.com/libevent/libevent/commit/329acc18a0768c21ba22522f01a5c7f46cacc4d5
https://github.com/libevent/libevent/issues/318
https://linux.oracle.com/cve/CVE-2016-10196.html
https://linux.oracle.com/errata/ELSA-2017-1201.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10196
https://security.gentoo.org/glsa/201705-01
https://ubuntu.com/security/notices/USN-3228-1
https://ubuntu.com/security/notices/USN-3278-1
https://www.cve.org/CVERecord?id=CVE-2016-10196
https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/
https://www.mozilla.org/security/advisories/mfsa2017-10/
https://www.mozilla.org/security/advisories/mfsa2017-11/
https://www.mozilla.org/security/advisories/mfsa2017-12/
https://www.mozilla.org/security/advisories/mfsa2017-13/
|
| libevent |
CVE-2016-10197 |
LOW |
2.0.21-4.el7 |
|
http://www.debian.org/security/2017/dsa-3789
http://www.openwall.com/lists/oss-security/2017/01/31/17
http://www.openwall.com/lists/oss-security/2017/02/02/7
http://www.securityfocus.com/bid/96014
http://www.securitytracker.com/id/1038320
https://access.redhat.com/errata/RHSA-2017:1104
https://access.redhat.com/errata/RHSA-2017:1106
https://access.redhat.com/errata/RHSA-2017:1201
https://access.redhat.com/security/cve/CVE-2016-10197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10197
https://github.com/libevent/libevent/blob/release-2.1.6-beta/ChangeLog
https://github.com/libevent/libevent/commit/ec65c42052d95d2c23d1d837136d1cf1d9ecef9e
https://github.com/libevent/libevent/issues/332
https://linux.oracle.com/cve/CVE-2016-10197.html
https://linux.oracle.com/errata/ELSA-2017-1201.html
https://nvd.nist.gov/vuln/detail/CVE-2016-10197
https://security.gentoo.org/glsa/201705-01
https://ubuntu.com/security/notices/USN-3228-1
https://ubuntu.com/security/notices/USN-3278-1
https://www.cve.org/CVERecord?id=CVE-2016-10197
https://www.mozilla.org/en-US/security/advisories/mfsa2017-10/
https://www.mozilla.org/en-US/security/advisories/mfsa2017-13/
|
| libgcc |
CVE-2014-5044 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
https://nvd.nist.gov/vuln/detail/CVE-2014-5044
https://www.cve.org/CVERecord?id=CVE-2014-5044
|
| libgcc |
CVE-2018-20673 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20673
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
https://www.cve.org/CVERecord?id=CVE-2018-20673
|
| libgcc |
CVE-2019-16276 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://nvd.nist.gov/vuln/detail/CVE-2019-16276
https://security.netapp.com/advisory/ntap-20191122-0004/
https://www.cve.org/CVERecord?id=CVE-2019-16276
|
| libgcc |
CVE-2020-16845 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002
https://security.netapp.com/advisory/ntap-20200924-0002/
https://ubuntu.com/security/notices/USN-5725-1
https://ubuntu.com/security/notices/USN-5725-2
https://www.cve.org/CVERecord?id=CVE-2020-16845
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| libgcc |
CVE-2020-24553 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://groups.google.com/forum/#%21topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.cve.org/CVERecord?id=CVE-2020-24553
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| libgcc |
CVE-2020-28362 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
https://www.cve.org/CVERecord?id=CVE-2020-28362
|
| libgcc |
CVE-2020-28366 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://go.dev/cl/269658
https://go.dev/issue/42559
https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://pkg.go.dev/vuln/GO-2022-0475
https://www.cve.org/CVERecord?id=CVE-2020-28366
|
| libgcc |
CVE-2020-28367 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://go.dev/cl/267277
https://go.dev/issue/42556
https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://pkg.go.dev/vuln/GO-2022-0476
https://www.cve.org/CVERecord?id=CVE-2020-28367
|
| libgcc |
CVE-2021-27918 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
https://security.gentoo.org/glsa/202208-02
https://www.cve.org/CVERecord?id=CVE-2021-27918
|
| libgcc |
CVE-2021-42574 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://bugzilla.redhat.com/show_bug.cgi?id=2005819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574
https://errata.rockylinux.org/RLSA-2021:4585
https://github.com/rust-lang/rust/commit/dd61274930ec0cd17711fab52d2bc9ad3e9053de (1.56.1)
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-42574
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42574
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.openwall.com/lists/oss-security/2021/11/01/1
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.starwindsoftware.com/security/sw-20220804-0002/
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| libgcc |
CVE-2021-42694 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://nvd.nist.gov/vuln/detail/CVE-2021-42694
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42694
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
|
| libgcc |
CVE-2015-5276 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
https://nvd.nist.gov/vuln/detail/CVE-2015-5276
https://www.cve.org/CVERecord?id=CVE-2015-5276
|
| libgcc |
CVE-2016-2226 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://nvd.nist.gov/vuln/detail/CVE-2016-2226
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-2226
https://www.exploit-db.com/exploits/42386/
|
| libgcc |
CVE-2016-4487 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4487
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4487
|
| libgcc |
CVE-2016-4488 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4488
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4488
|
| libgcc |
CVE-2016-4489 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://nvd.nist.gov/vuln/detail/CVE-2016-4489
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4489
|
| libgcc |
CVE-2016-4490 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://nvd.nist.gov/vuln/detail/CVE-2016-4490
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4490
|
| libgcc |
CVE-2016-4491 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4491
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4491
|
| libgcc |
CVE-2016-4492 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=03ef0c6c55ab81002abef62cec430d0496c3a01c
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4492
|
| libgcc |
CVE-2016-4493 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4493
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4493
|
| libgcc |
CVE-2018-20657 |
LOW |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20657
https://support.f5.com/csp/article/K62602089
https://www.cve.org/CVERecord?id=CVE-2018-20657
|
| libgcc |
CVE-2019-14250 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-14250
|
| libgcc |
CVE-2021-3826 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6372
https://access.redhat.com/security/cve/CVE-2021-3826
https://bugzilla.redhat.com/2122627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
https://errata.almalinux.org/9/ALSA-2023-6372.html
https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987
https://linux.oracle.com/cve/CVE-2021-3826.html
https://linux.oracle.com/errata/ELSA-2023-6372.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2021-3826
https://www.cve.org/CVERecord?id=CVE-2021-3826
|
| libgcc |
CVE-2021-46195 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8415
https://access.redhat.com/security/cve/CVE-2021-46195
https://bugzilla.redhat.com/2046300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195
https://errata.almalinux.org/9/ALSA-2022-8415.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=f10bec5ffa487ad3033ed5f38cfd0fc7d696deab
https://linux.oracle.com/cve/CVE-2021-46195.html
https://linux.oracle.com/errata/ELSA-2022-8415.html
https://nvd.nist.gov/vuln/detail/CVE-2021-46195
https://www.cve.org/CVERecord?id=CVE-2021-46195
|
| libgcc |
CVE-2022-27943 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-27943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
|
| libgcrypt |
CVE-2014-5270 |
MEDIUM |
1.5.3-14.el7 |
|
http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html
http://openwall.com/lists/oss-security/2014/08/16/2
http://www.cs.tau.ac.il/~tromer/handsoff/
http://www.debian.org/security/2014/dsa-3024
http://www.debian.org/security/2014/dsa-3073
https://access.redhat.com/security/cve/CVE-2014-5270
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270
https://nvd.nist.gov/vuln/detail/CVE-2014-5270
https://ubuntu.com/security/notices/USN-2339-1
https://ubuntu.com/security/notices/USN-2339-2
https://www.cve.org/CVERecord?id=CVE-2014-5270
|
| libgcrypt |
CVE-2017-7526 |
MEDIUM |
1.5.3-14.el7 |
|
http://www.securityfocus.com/bid/99338
http://www.securitytracker.com/id/1038915
https://access.redhat.com/security/cve/CVE-2017-7526
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526
https://eprint.iacr.org/2017/627
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=78130828e9a140a9de4dafadbc844dbb64cb709a
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=8725c99ffa41778f382ca97233183bcd687bb0ce
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=e6a3dc9900433bbc8ad362a595a3837318c28fa9
https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7526
https://ubuntu.com/security/notices/USN-3347-1
https://ubuntu.com/security/notices/USN-3347-2
https://ubuntu.com/security/notices/USN-3733-1
https://ubuntu.com/security/notices/USN-3733-2
https://usn.ubuntu.com/3733-1/
https://usn.ubuntu.com/3733-2/
https://www.cve.org/CVERecord?id=CVE-2017-7526
https://www.debian.org/security/2017/dsa-3901
https://www.debian.org/security/2017/dsa-3960
|
| libgcrypt |
CVE-2019-12904 |
MEDIUM |
1.5.3-14.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00049.html
https://access.redhat.com/security/cve/CVE-2019-12904
https://dev.gnupg.org/T4541
https://github.com/gpg/libgcrypt/commit/a4c561aab1014c3630bc88faf6f5246fee16b020
https://github.com/gpg/libgcrypt/commit/daedbbb5541cd8ecda1459d3b843ea4d92788762
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.gnupg.org/pipermail/gcrypt-devel/2019-July/004760.html
https://nvd.nist.gov/vuln/detail/CVE-2019-12904
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12904.html
https://www.cve.org/CVERecord?id=CVE-2019-12904
|
| libgcrypt |
CVE-2021-33560 |
MEDIUM |
1.5.3-14.el7 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json
https://access.redhat.com/security/cve/CVE-2021-33560
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560
https://dev.gnupg.org/T5305
https://dev.gnupg.org/T5328
https://dev.gnupg.org/T5466
https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2021-4409.html
https://linux.oracle.com/cve/CVE-2021-33560.html
https://linux.oracle.com/errata/ELSA-2022-9263.html
https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/
https://nvd.nist.gov/vuln/detail/CVE-2021-33560
https://security.gentoo.org/glsa/202210-13
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.cve.org/CVERecord?id=CVE-2021-33560
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libgcrypt |
CVE-2021-40528 |
MEDIUM |
1.5.3-14.el7 |
|
https://access.redhat.com/errata/RHSA-2022:5311
https://access.redhat.com/security/cve/CVE-2021-40528
https://bugzilla.redhat.com/2002816
https://bugzilla.redhat.com/show_bug.cgi?id=2002816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528
https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13
https://eprint.iacr.org/2021/923
https://errata.almalinux.org/8/ALSA-2022-5311.html
https://errata.rockylinux.org/RLSA-2022:5311
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git%3Ba=commit%3Bh=3462280f2e23e16adf3ed5176e0f2413d8861320
https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
https://linux.oracle.com/cve/CVE-2021-40528.html
https://linux.oracle.com/errata/ELSA-2022-9564.html
https://nvd.nist.gov/vuln/detail/CVE-2021-40528
https://security.gentoo.org/glsa/202210-13
https://ubuntu.com/security/notices/USN-5080-1
https://ubuntu.com/security/notices/USN-5080-2
https://www.cve.org/CVERecord?id=CVE-2021-40528
|
| libgcrypt |
CVE-2024-2236 |
MEDIUM |
1.5.3-14.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-2236
https://bugzilla.redhat.com/show_bug.cgi?id=2268268
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2236
https://github.com/tomato42/marvin-toolkit/tree/master/example/libgcrypt
https://lists.gnupg.org/pipermail/gcrypt-devel/2024-March/005607.html
https://nvd.nist.gov/vuln/detail/CVE-2024-2236
https://www.cve.org/CVERecord?id=CVE-2024-2236
|
| libgcrypt |
CVE-2014-3591 |
LOW |
1.5.3-14.el7 |
|
http://www.cs.tau.ac.il/~tromer/radioexp/
http://www.debian.org/security/2015/dsa-3184
http://www.debian.org/security/2015/dsa-3185
https://access.redhat.com/security/cve/CVE-2014-3591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
https://nvd.nist.gov/vuln/detail/CVE-2014-3591
https://ubuntu.com/security/notices/USN-2554-1
https://ubuntu.com/security/notices/USN-2555-1
https://www.cve.org/CVERecord?id=CVE-2014-3591
|
| libgcrypt |
CVE-2015-0837 |
LOW |
1.5.3-14.el7 |
|
http://www.debian.org/security/2015/dsa-3184
http://www.debian.org/security/2015/dsa-3185
https://access.redhat.com/security/cve/CVE-2015-0837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837
https://ieeexplore.ieee.org/document/7163050
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html
https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html
https://nvd.nist.gov/vuln/detail/CVE-2015-0837
https://ubuntu.com/security/notices/USN-2554-1
https://ubuntu.com/security/notices/USN-2555-1
https://www.cve.org/CVERecord?id=CVE-2015-0837
|
| libgomp |
CVE-2014-5044 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
https://nvd.nist.gov/vuln/detail/CVE-2014-5044
https://www.cve.org/CVERecord?id=CVE-2014-5044
|
| libgomp |
CVE-2018-20673 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20673
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
https://www.cve.org/CVERecord?id=CVE-2018-20673
|
| libgomp |
CVE-2019-16276 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://nvd.nist.gov/vuln/detail/CVE-2019-16276
https://security.netapp.com/advisory/ntap-20191122-0004/
https://www.cve.org/CVERecord?id=CVE-2019-16276
|
| libgomp |
CVE-2020-16845 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002
https://security.netapp.com/advisory/ntap-20200924-0002/
https://ubuntu.com/security/notices/USN-5725-1
https://ubuntu.com/security/notices/USN-5725-2
https://www.cve.org/CVERecord?id=CVE-2020-16845
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| libgomp |
CVE-2020-24553 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://groups.google.com/forum/#%21topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.cve.org/CVERecord?id=CVE-2020-24553
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| libgomp |
CVE-2020-28362 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
https://www.cve.org/CVERecord?id=CVE-2020-28362
|
| libgomp |
CVE-2020-28366 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://go.dev/cl/269658
https://go.dev/issue/42559
https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://pkg.go.dev/vuln/GO-2022-0475
https://www.cve.org/CVERecord?id=CVE-2020-28366
|
| libgomp |
CVE-2020-28367 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://go.dev/cl/267277
https://go.dev/issue/42556
https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://pkg.go.dev/vuln/GO-2022-0476
https://www.cve.org/CVERecord?id=CVE-2020-28367
|
| libgomp |
CVE-2021-27918 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
https://security.gentoo.org/glsa/202208-02
https://www.cve.org/CVERecord?id=CVE-2021-27918
|
| libgomp |
CVE-2021-42574 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://bugzilla.redhat.com/show_bug.cgi?id=2005819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574
https://errata.rockylinux.org/RLSA-2021:4585
https://github.com/rust-lang/rust/commit/dd61274930ec0cd17711fab52d2bc9ad3e9053de (1.56.1)
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-42574
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42574
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.openwall.com/lists/oss-security/2021/11/01/1
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.starwindsoftware.com/security/sw-20220804-0002/
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| libgomp |
CVE-2021-42694 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://nvd.nist.gov/vuln/detail/CVE-2021-42694
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42694
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
|
| libgomp |
CVE-2015-5276 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
https://nvd.nist.gov/vuln/detail/CVE-2015-5276
https://www.cve.org/CVERecord?id=CVE-2015-5276
|
| libgomp |
CVE-2016-2226 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://nvd.nist.gov/vuln/detail/CVE-2016-2226
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-2226
https://www.exploit-db.com/exploits/42386/
|
| libgomp |
CVE-2016-4487 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4487
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4487
|
| libgomp |
CVE-2016-4488 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4488
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4488
|
| libgomp |
CVE-2016-4489 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://nvd.nist.gov/vuln/detail/CVE-2016-4489
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4489
|
| libgomp |
CVE-2016-4490 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://nvd.nist.gov/vuln/detail/CVE-2016-4490
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4490
|
| libgomp |
CVE-2016-4491 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4491
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4491
|
| libgomp |
CVE-2016-4492 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=03ef0c6c55ab81002abef62cec430d0496c3a01c
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4492
|
| libgomp |
CVE-2016-4493 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4493
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4493
|
| libgomp |
CVE-2018-20657 |
LOW |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20657
https://support.f5.com/csp/article/K62602089
https://www.cve.org/CVERecord?id=CVE-2018-20657
|
| libgomp |
CVE-2019-14250 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-14250
|
| libgomp |
CVE-2021-3826 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6372
https://access.redhat.com/security/cve/CVE-2021-3826
https://bugzilla.redhat.com/2122627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
https://errata.almalinux.org/9/ALSA-2023-6372.html
https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987
https://linux.oracle.com/cve/CVE-2021-3826.html
https://linux.oracle.com/errata/ELSA-2023-6372.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2021-3826
https://www.cve.org/CVERecord?id=CVE-2021-3826
|
| libgomp |
CVE-2021-46195 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8415
https://access.redhat.com/security/cve/CVE-2021-46195
https://bugzilla.redhat.com/2046300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195
https://errata.almalinux.org/9/ALSA-2022-8415.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=f10bec5ffa487ad3033ed5f38cfd0fc7d696deab
https://linux.oracle.com/cve/CVE-2021-46195.html
https://linux.oracle.com/errata/ELSA-2022-8415.html
https://nvd.nist.gov/vuln/detail/CVE-2021-46195
https://www.cve.org/CVERecord?id=CVE-2021-46195
|
| libgomp |
CVE-2022-27943 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-27943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
|
| libidn |
CVE-2015-2059 |
LOW |
1.28-4.el7 |
|
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html
http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3578
http://www.openwall.com/lists/oss-security/2015/02/23/25
http://www.securityfocus.com/bid/72736
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2015-2059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2059
https://github.com/jabberd2/jabberd2/issues/85
https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00026.html (regression)
https://nvd.nist.gov/vuln/detail/CVE-2015-2059
https://ubuntu.com/security/notices/USN-3068-1
https://www.cve.org/CVERecord?id=CVE-2015-2059
|
| libidn |
CVE-2015-8948 |
LOW |
1.28-4.el7 |
|
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2015-8948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://marc.info/?l=oss-security&m=146910769415616&w=2
https://nvd.nist.gov/vuln/detail/CVE-2015-8948
https://ubuntu.com/security/notices/USN-3068-1
https://www.cve.org/CVERecord?id=CVE-2015-8948
|
| libidn |
CVE-2016-6261 |
LOW |
1.28-4.el7 |
|
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00016.html
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6261
https://ubuntu.com/security/notices/USN-3068-1
https://www.cve.org/CVERecord?id=CVE-2016-6261
|
| libidn |
CVE-2016-6262 |
LOW |
1.28-4.el7 |
|
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6262
https://ubuntu.com/security/notices/USN-3068-1
https://www.cve.org/CVERecord?id=CVE-2016-6262
|
| libidn |
CVE-2016-6263 |
LOW |
1.28-4.el7 |
|
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6263
https://security.gentoo.org/glsa/201908-06
https://ubuntu.com/security/notices/USN-3068-1
https://www.cve.org/CVERecord?id=CVE-2016-6263
|
| libidn |
CVE-2017-14062 |
LOW |
1.28-4.el7 |
|
http://www.debian.org/security/2017/dsa-3988
https://access.redhat.com/security/cve/CVE-2017-14062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14062
https://gitlab.com/libidn/libidn2/blob/master/NEWS
https://gitlab.com/libidn/libidn2/commit/3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd
https://lists.debian.org/debian-lts-announce/2018/07/msg00040.html
https://nvd.nist.gov/vuln/detail/CVE-2017-14062
https://ubuntu.com/security/notices/USN-3421-1
https://ubuntu.com/security/notices/USN-3434-1
https://ubuntu.com/security/notices/USN-3434-2
https://www.cve.org/CVERecord?id=CVE-2017-14062
|
| libidn-devel |
CVE-2015-2059 |
LOW |
1.28-4.el7 |
|
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html
http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3578
http://www.openwall.com/lists/oss-security/2015/02/23/25
http://www.securityfocus.com/bid/72736
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2015-2059
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2059
https://github.com/jabberd2/jabberd2/issues/85
https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00026.html (regression)
https://nvd.nist.gov/vuln/detail/CVE-2015-2059
https://ubuntu.com/security/notices/USN-3068-1
https://www.cve.org/CVERecord?id=CVE-2015-2059
|
| libidn-devel |
CVE-2015-8948 |
LOW |
1.28-4.el7 |
|
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2015-8948
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://marc.info/?l=oss-security&m=146910769415616&w=2
https://nvd.nist.gov/vuln/detail/CVE-2015-8948
https://ubuntu.com/security/notices/USN-3068-1
https://www.cve.org/CVERecord?id=CVE-2015-8948
|
| libidn-devel |
CVE-2016-6261 |
LOW |
1.28-4.el7 |
|
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00016.html
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6261
https://ubuntu.com/security/notices/USN-3068-1
https://www.cve.org/CVERecord?id=CVE-2016-6261
|
| libidn-devel |
CVE-2016-6262 |
LOW |
1.28-4.el7 |
|
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6262
https://ubuntu.com/security/notices/USN-3068-1
https://www.cve.org/CVERecord?id=CVE-2016-6262
|
| libidn-devel |
CVE-2016-6263 |
LOW |
1.28-4.el7 |
|
http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555
http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
http://www.debian.org/security/2016/dsa-3658
http://www.openwall.com/lists/oss-security/2016/07/20/6
http://www.openwall.com/lists/oss-security/2016/07/21/4
http://www.securityfocus.com/bid/92070
http://www.ubuntu.com/usn/USN-3068-1
https://access.redhat.com/security/cve/CVE-2016-6263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6263
https://security.gentoo.org/glsa/201908-06
https://ubuntu.com/security/notices/USN-3068-1
https://www.cve.org/CVERecord?id=CVE-2016-6263
|
| libidn-devel |
CVE-2017-14062 |
LOW |
1.28-4.el7 |
|
http://www.debian.org/security/2017/dsa-3988
https://access.redhat.com/security/cve/CVE-2017-14062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14062
https://gitlab.com/libidn/libidn2/blob/master/NEWS
https://gitlab.com/libidn/libidn2/commit/3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd
https://lists.debian.org/debian-lts-announce/2018/07/msg00040.html
https://nvd.nist.gov/vuln/detail/CVE-2017-14062
https://ubuntu.com/security/notices/USN-3421-1
https://ubuntu.com/security/notices/USN-3434-1
https://ubuntu.com/security/notices/USN-3434-2
https://www.cve.org/CVERecord?id=CVE-2017-14062
|
| libjpeg-turbo |
CVE-2019-2201 |
MEDIUM |
1.2.90-8.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00048.html
https://access.redhat.com/security/cve/CVE-2019-2201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2201
https://lists.apache.org/thread.html/rc800763a88775ac9abb83b3402bcd0913d41ac65fdfc759af38f2280%40%3Ccommits.mxnet.apache.org%3E
https://lists.debian.org/debian-lts-announce/2022/05/msg00048.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y4QPASQPZO644STRFTLOD35RIRGWWRNI/
https://nvd.nist.gov/vuln/detail/CVE-2019-2201
https://security.gentoo.org/glsa/202003-23
https://source.android.com/security/bulletin/2019-11-01
https://ubuntu.com/security/notices/USN-4190-1
https://usn.ubuntu.com/4190-1/
https://www.cve.org/CVERecord?id=CVE-2019-2201
|
| libjpeg-turbo |
CVE-2020-13790 |
MEDIUM |
1.2.90-8.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00062.html
https://access.redhat.com/security/cve/CVE-2020-13790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13790
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/3de15e0c344d11d4b90f4a47136467053eb2d09a
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/433
https://lists.debian.org/debian-lts-announce/2020/07/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P4D6KNUY7YANSPH7SVQ44PJKSABFKAUB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6563YHSVZK24MPJXGJVK3CQG7JVWZGK/
https://nvd.nist.gov/vuln/detail/CVE-2020-13790
https://security.gentoo.org/glsa/202010-03
https://ubuntu.com/security/notices/USN-4386-1
https://usn.ubuntu.com/4386-1/
https://www.cve.org/CVERecord?id=CVE-2020-13790
|
| libjpeg-turbo |
CVE-2020-17541 |
MEDIUM |
1.2.90-8.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-17541
https://bugzilla.redhat.com/show_bug.cgi?id=1968036
https://bugzilla.redhat.com/show_bug.cgi?id=1982572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17541
https://cwe.mitre.org/data/definitions/121.html
https://errata.almalinux.org/8/ALSA-2021-4288.html
https://errata.rockylinux.org/RLSA-2021:4288
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
https://linux.oracle.com/cve/CVE-2020-17541.html
https://linux.oracle.com/errata/ELSA-2021-4288.html
https://nvd.nist.gov/vuln/detail/CVE-2020-17541
https://ubuntu.com/security/notices/USN-5553-1
https://ubuntu.com/security/notices/USN-5631-1
https://www.cve.org/CVERecord?id=CVE-2020-17541
|
| libjpeg-turbo |
CVE-2021-29390 |
MEDIUM |
1.2.90-8.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-29390
https://bugzilla.redhat.com/show_bug.cgi?id=1943797
https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595
https://github.com/libjpeg-turbo/libjpeg-turbo/commit/ccaba5d7894ecfb5a8f11e48d3f86e1f14d5a469
https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/459#issuecomment-733720010
https://github.com/libjpeg-turbo/libjpeg-turbo/pull/476
https://github.com/libjpeg-turbo/libjpeg-turbo/pull/724
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
https://nvd.nist.gov/vuln/detail/CVE-2021-29390
https://www.cve.org/CVERecord?id=CVE-2021-29390
|
| libjpeg-turbo |
CVE-2014-9092 |
LOW |
1.2.90-8.el7 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147315.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147336.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150957.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150967.html
http://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=26482&sid=81658bc2f51a8d9893279cd01e83783f
http://www.openwall.com/lists/oss-security/2014/11/26/8
http://www.securityfocus.com/bid/71326
https://access.redhat.com/security/cve/CVE-2014-9092
https://bugzilla.redhat.com/show_bug.cgi?id=1169845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9092
https://nvd.nist.gov/vuln/detail/CVE-2014-9092
https://tapani.tarvainen.info/linux/convertbug/
https://ubuntu.com/security/notices/USN-3706-1
https://ubuntu.com/security/notices/USN-3706-2
https://usn.ubuntu.com/3706-1/
https://usn.ubuntu.com/3706-2/
https://www.cve.org/CVERecord?id=CVE-2014-9092
|
| libjpeg-turbo |
CVE-2017-15232 |
LOW |
1.2.90-8.el7 |
|
https://access.redhat.com/security/cve/CVE-2017-15232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15232
https://github.com/libjpeg-turbo/libjpeg-turbo/pull/182
https://github.com/mozilla/mozjpeg/issues/268
https://nvd.nist.gov/vuln/detail/CVE-2017-15232
https://ubuntu.com/security/notices/USN-3706-1
https://usn.ubuntu.com/3706-1/
https://www.cve.org/CVERecord?id=CVE-2017-15232
|
| libjpeg-turbo |
CVE-2017-9614 |
LOW |
1.2.90-8.el7 |
|
http://packetstormsecurity.com/files/143518/libjpeg-turbo-1.5.1-Denial-Of-Service.html
http://seclists.org/fulldisclosure/2017/Jul/66
https://access.redhat.com/security/cve/CVE-2017-9614
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/167
https://nvd.nist.gov/vuln/detail/CVE-2017-9614
https://www.cve.org/CVERecord?id=CVE-2017-9614
https://www.exploit-db.com/exploits/42391/
|
| libjpeg-turbo |
CVE-2019-13960 |
LOW |
1.2.90-8.el7 |
|
https://access.redhat.com/security/cve/CVE-2019-13960
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/337
https://libjpeg-turbo.org/pmwiki/uploads/About/TwoIssueswiththeJPEGStandard.pdf
https://nvd.nist.gov/vuln/detail/CVE-2019-13960
https://www.cve.org/CVERecord?id=CVE-2019-13960
|
| libmount |
CVE-2014-9114 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
http://www.openwall.com/lists/oss-security/2014/11/26/13
http://www.openwall.com/lists/oss-security/2014/11/26/21
http://www.securityfocus.com/bid/71327
https://access.redhat.com/security/cve/CVE-2014-9114
https://bugzilla.redhat.com/show_bug.cgi?id=1168485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114
https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-9114
https://security.gentoo.org/glsa/201612-14
https://www.cve.org/CVERecord?id=CVE-2014-9114
|
| libmount |
CVE-2016-2779 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://nvd.nist.gov/vuln/detail/CVE-2016-2779
https://www.cve.org/CVERecord?id=CVE-2016-2779
|
| libmount |
CVE-2020-21583 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-21583
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21583
https://nvd.nist.gov/vuln/detail/CVE-2020-21583
https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html
https://www.cve.org/CVERecord?id=CVE-2020-21583
|
| libmount |
CVE-2022-0563 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
|
| libmount |
CVE-2015-5218 |
LOW |
2.23.2-65.el7_9.1 |
|
http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
http://www.spinics.net/lists/util-linux-ng/msg11873.html
https://access.redhat.com/security/cve/CVE-2015-5218
https://bugzilla.redhat.com/show_bug.cgi?id=1259322
https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
https://nvd.nist.gov/vuln/detail/CVE-2015-5218
https://www.cve.org/CVERecord?id=CVE-2015-5218
https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
|
| libmount |
CVE-2021-37600 |
LOW |
2.23.2-65.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2021-37600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20210902-0002/
https://www.cve.org/CVERecord?id=CVE-2021-37600
|
| libpng |
CVE-2015-8540 |
LOW |
2:1.5.13-8.el7 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174435.html
http://sourceforge.net/p/libpng/bugs/244/
http://sourceforge.net/p/libpng/code/ci/d9006f683c641793252d92254a75ae9b815b42ed/
http://sourceforge.net/projects/libpng/files/libpng10/1.0.66/
http://sourceforge.net/projects/libpng/files/libpng12/1.2.56/
http://sourceforge.net/projects/libpng/files/libpng14/1.4.19/
http://sourceforge.net/projects/libpng/files/libpng15/1.5.26/
http://www.debian.org/security/2016/dsa-3443
http://www.openwall.com/lists/oss-security/2015/12/10/6
http://www.openwall.com/lists/oss-security/2015/12/10/7
http://www.openwall.com/lists/oss-security/2015/12/11/1
http://www.openwall.com/lists/oss-security/2015/12/11/2
http://www.openwall.com/lists/oss-security/2015/12/17/10
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/80592
https://access.redhat.com/errata/RHSA-2016:1430
https://access.redhat.com/security/cve/CVE-2015-8540
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-8540
https://security.gentoo.org/glsa/201611-08
https://ubuntu.com/security/notices/USN-2861-1
https://www.cve.org/CVERecord?id=CVE-2015-8540
|
| libpng |
CVE-2016-10087 |
LOW |
2:1.5.13-8.el7 |
|
http://www.openwall.com/lists/oss-security/2016/12/29/2
http://www.openwall.com/lists/oss-security/2016/12/30/4
http://www.securityfocus.com/bid/95157
https://access.redhat.com/security/cve/CVE-2016-10087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-10087
https://security.gentoo.org/glsa/201701-74
https://sourceforge.net/p/libpng/code/ci/243d4e5f3fe71740d52a53cf3dd77cc83a3430ba
https://sourceforge.net/p/libpng/code/ci/794a15fad6add4d636369d0b46f603a02995b2e2/ (libpng12)
https://sourceforge.net/p/libpng/code/ci/812768d7a9c973452222d454634496b25ed415eb (libpng16)
https://ubuntu.com/security/notices/USN-3712-1
https://ubuntu.com/security/notices/USN-3712-2
https://usn.ubuntu.com/3712-1/
https://usn.ubuntu.com/3712-2/
https://www.cve.org/CVERecord?id=CVE-2016-10087
|
| libpng |
CVE-2022-3857 |
LOW |
2:1.5.13-8.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-3857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3857
https://nvd.nist.gov/vuln/detail/CVE-2022-3857
https://security.netapp.com/advisory/ntap-20230406-0004/
https://sourceforge.net/p/libpng/bugs/300/
https://www.cve.org/CVERecord?id=CVE-2022-3857
|
| libsepol |
CVE-2021-36084 |
MEDIUM |
2.5-10.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-36084
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065
https://bugzilla.redhat.com/show_bug.cgi?id=1979662
https://bugzilla.redhat.com/show_bug.cgi?id=1979664
https://bugzilla.redhat.com/show_bug.cgi?id=1979666
https://bugzilla.redhat.com/show_bug.cgi?id=1979668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://errata.rockylinux.org/RLSA-2021:4513
https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml
https://linux.oracle.com/cve/CVE-2021-36084.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://nvd.nist.gov/vuln/detail/CVE-2021-36084
https://ubuntu.com/security/notices/USN-5391-1
https://www.cve.org/CVERecord?id=CVE-2021-36084
|
| libsepol |
CVE-2021-36085 |
MEDIUM |
2.5-10.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-36085
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124
https://bugzilla.redhat.com/show_bug.cgi?id=1979662
https://bugzilla.redhat.com/show_bug.cgi?id=1979664
https://bugzilla.redhat.com/show_bug.cgi?id=1979666
https://bugzilla.redhat.com/show_bug.cgi?id=1979668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://errata.rockylinux.org/RLSA-2021:4513
https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml
https://linux.oracle.com/cve/CVE-2021-36085.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://nvd.nist.gov/vuln/detail/CVE-2021-36085
https://ubuntu.com/security/notices/USN-5391-1
https://www.cve.org/CVERecord?id=CVE-2021-36085
|
| libsepol |
CVE-2021-36086 |
MEDIUM |
2.5-10.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-36086
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177
https://bugzilla.redhat.com/show_bug.cgi?id=1979662
https://bugzilla.redhat.com/show_bug.cgi?id=1979664
https://bugzilla.redhat.com/show_bug.cgi?id=1979666
https://bugzilla.redhat.com/show_bug.cgi?id=1979668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://errata.rockylinux.org/RLSA-2021:4513
https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml
https://linux.oracle.com/cve/CVE-2021-36086.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://nvd.nist.gov/vuln/detail/CVE-2021-36086
https://ubuntu.com/security/notices/USN-5391-1
https://www.cve.org/CVERecord?id=CVE-2021-36086
|
| libsepol |
CVE-2021-36087 |
MEDIUM |
2.5-10.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-36087
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675
https://bugzilla.redhat.com/show_bug.cgi?id=1979662
https://bugzilla.redhat.com/show_bug.cgi?id=1979664
https://bugzilla.redhat.com/show_bug.cgi?id=1979666
https://bugzilla.redhat.com/show_bug.cgi?id=1979668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087
https://errata.almalinux.org/8/ALSA-2021-4513.html
https://errata.rockylinux.org/RLSA-2021:4513
https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml
https://linux.oracle.com/cve/CVE-2021-36087.html
https://linux.oracle.com/errata/ELSA-2021-4513.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/
https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ%40mail.gmail.com/T/
https://nvd.nist.gov/vuln/detail/CVE-2021-36087
https://ubuntu.com/security/notices/USN-5391-1
https://www.cve.org/CVERecord?id=CVE-2021-36087
|
| libss |
CVE-2015-0247 |
MEDIUM |
1.42.9-19.el7 |
|
http://advisories.mageia.org/MGASA-2015-0061.html
http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:045
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.ocert.org/advisories/ocert-2015-002.html
http://www.securityfocus.com/archive/1/534633/100/0/threaded
http://www.securityfocus.com/bid/72520
http://www.ubuntu.com/usn/USN-2507-1
https://access.redhat.com/security/cve/CVE-2015-0247
https://bugzilla.redhat.com/show_bug.cgi?id=1187032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247
https://exchange.xforce.ibmcloud.com/vulnerabilities/100740
https://nvd.nist.gov/vuln/detail/CVE-2015-0247
https://security.gentoo.org/glsa/201701-06
https://ubuntu.com/security/notices/USN-2507-1
https://www.cve.org/CVERecord?id=CVE-2015-0247
|
| libss |
CVE-2022-1304 |
MEDIUM |
1.42.9-19.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8361
https://access.redhat.com/security/cve/CVE-2022-1304
https://bugzilla.redhat.com/2069726
https://bugzilla.redhat.com/show_bug.cgi?id=2069726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304
https://errata.almalinux.org/9/ALSA-2022-8361.html
https://errata.rockylinux.org/RLSA-2022:8361
https://linux.oracle.com/cve/CVE-2022-1304.html
https://linux.oracle.com/errata/ELSA-2022-8361.html
https://marc.info/?l=linux-ext4&m=165056234501732&w=2
https://nvd.nist.gov/vuln/detail/CVE-2022-1304
https://ubuntu.com/security/notices/USN-5464-1
https://www.cve.org/CVERecord?id=CVE-2022-1304
|
| libss |
CVE-2015-1572 |
LOW |
1.42.9-19.el7 |
|
http://advisories.mageia.org/MGASA-2015-0088.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.mandriva.com/security/advisories?name=MDVSA-2015:068
http://www.securityfocus.com/bid/72709
http://www.ubuntu.com/usn/USN-2507-1
https://access.redhat.com/security/cve/CVE-2015-1572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572
https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73
https://nvd.nist.gov/vuln/detail/CVE-2015-1572
https://security.gentoo.org/glsa/201507-22
https://ubuntu.com/security/notices/USN-2507-1
https://www.cve.org/CVERecord?id=CVE-2015-1572
|
| libssh2 |
CVE-2019-13115 |
MEDIUM |
1.8.0-4.el7_9.1 |
|
http://packetstormsecurity.com/files/172834/libssh2-1.8.2-Out-Of-Bounds-Read.html
https://access.redhat.com/security/cve/CVE-2019-13115
https://blog.semmle.com/libssh2-integer-overflow/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115
https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa
https://github.com/libssh2/libssh2/pull/350
https://libssh2.org/changes.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/
https://nvd.nist.gov/vuln/detail/CVE-2019-13115
https://security.netapp.com/advisory/ntap-20190806-0002/
https://support.f5.com/csp/article/K13322484
https://support.f5.com/csp/article/K13322484?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-5308-1
https://www.cve.org/CVERecord?id=CVE-2019-13115
|
| libssh2 |
CVE-2019-3859 |
MEDIUM |
1.8.0-4.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html
http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html
http://www.openwall.com/lists/oss-security/2019/03/18/3
http://www.securityfocus.com/bid/107485
https://access.redhat.com/security/cve/CVE-2019-3859
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3859
https://github.com/libssh2/libssh2/pull/315
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
https://lists.debian.org/debian-lts-announce/2019/04/msg00006.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/
https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html
https://nvd.nist.gov/vuln/detail/CVE-2019-3859
https://seclists.org/bugtraq/2019/Apr/25
https://seclists.org/bugtraq/2019/Mar/25
https://security.netapp.com/advisory/ntap-20190327-0005/
https://ubuntu.com/security/notices/USN-5308-1
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767
https://www.cve.org/CVERecord?id=CVE-2019-3859
https://www.debian.org/security/2019/dsa-4431
https://www.libssh2.org/CVE-2019-3859.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| libssh2 |
CVE-2019-3860 |
MEDIUM |
1.8.0-4.el7_9.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html
https://access.redhat.com/security/cve/CVE-2019-3860
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3860
https://github.com/libssh2/libssh2/pull/316
https://libssh2.org/CVE-2019-3860.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00028.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/
https://nvd.nist.gov/vuln/detail/CVE-2019-3860
https://seclists.org/bugtraq/2019/Apr/25
https://security.netapp.com/advisory/ntap-20190327-0005/
https://ubuntu.com/security/notices/USN-5308-1
https://www.cve.org/CVERecord?id=CVE-2019-3860
https://www.debian.org/security/2019/dsa-4431
https://www.libssh2.org/CVE-2019-3860.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| libssh2 |
CVE-2023-2283 |
MEDIUM |
1.8.0-4.el7_9.1 |
|
http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html
https://access.redhat.com/errata/RHSA-2023:6643
https://access.redhat.com/security/cve/CVE-2023-2283
https://bugzilla.redhat.com/2182199
https://bugzilla.redhat.com/2189736
https://bugzilla.redhat.com/show_bug.cgi?id=2182199
https://bugzilla.redhat.com/show_bug.cgi?id=2189736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2283
https://errata.almalinux.org/9/ALSA-2023-6643.html
https://errata.rockylinux.org/RLSA-2023:3839
https://linux.oracle.com/cve/CVE-2023-2283.html
https://linux.oracle.com/errata/ELSA-2023-6643.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27PD44ALQTZXX7K6JAM3BXBUHYA6DFFN/
https://nvd.nist.gov/vuln/detail/CVE-2023-2283
https://security.gentoo.org/glsa/202312-05
https://security.netapp.com/advisory/ntap-20240201-0005/
https://ubuntu.com/security/notices/USN-6138-1
https://www.cve.org/CVERecord?id=CVE-2023-2283
https://www.libssh.org/security/advisories/CVE-2023-2283.txt
|
| libssh2 |
CVE-2023-48795 |
MEDIUM |
1.8.0-4.el7_9.1 |
|
http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
http://seclists.org/fulldisclosure/2024/Mar/21
http://www.openwall.com/lists/oss-security/2023/12/18/3
http://www.openwall.com/lists/oss-security/2023/12/19/5
http://www.openwall.com/lists/oss-security/2023/12/20/3
https://access.redhat.com/errata/RHSA-2024:1150
https://access.redhat.com/security/cve/CVE-2023-48795
https://access.redhat.com/security/cve/cve-2023-48795
https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack
https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
https://bugs.gentoo.org/920280
https://bugzilla.redhat.com/2254210
https://bugzilla.redhat.com/show_bug.cgi?id=2254210
https://bugzilla.suse.com/show_bug.cgi?id=1217950
https://crates.io/crates/thrussh/versions
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795
https://errata.almalinux.org/9/ALSA-2024-1150.html
https://errata.rockylinux.org/RLSA-2024:0628
https://filezilla-project.org/versions.php
https://forum.netgate.com/topic/184941/terrapin-ssh-attack
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
https://github.com/NixOS/nixpkgs/pull/275249
https://github.com/PowerShell/Win32-OpenSSH/issues/2189
https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
https://github.com/advisories/GHSA-45x7-px36-x8w8
https://github.com/apache/mina-sshd/issues/445
https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
https://github.com/cyd01/KiTTY/issues/520
https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
https://github.com/erlang/otp/releases/tag/OTP-26.2.1
https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
https://github.com/hierynomus/sshj/issues/916
https://github.com/janmojzis/tinyssh/issues/81
https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
https://github.com/libssh2/libssh2/pull/1291
https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
https://github.com/mwiede/jsch/issues/457
https://github.com/mwiede/jsch/pull/461
https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
https://github.com/openssh/openssh-portable/commits/master
https://github.com/paramiko/paramiko/issues/2337
https://github.com/paramiko/paramiko/issues/2337#issuecomment-1887642773
https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
https://github.com/proftpd/proftpd/issues/456
https://github.com/rapier1/hpn-ssh/releases
https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
https://github.com/ronf/asyncssh/security/advisories/GHSA-hfmc-7525-mj55
https://github.com/ronf/asyncssh/tags
https://github.com/ssh-mitm/ssh-mitm/issues/165
https://github.com/warp-tech/russh
https://github.com/warp-tech/russh/commit/1aa340a7df1d5be1c0f4a9e247aade76dfdd2951
https://github.com/warp-tech/russh/releases/tag/v0.40.2
https://github.com/warp-tech/russh/security/advisories/GHSA-45x7-px36-x8w8
https://gitlab.com/libssh/libssh-mirror/-/tags
https://go.dev/cl/550715
https://go.dev/issue/64784
https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
https://help.panic.com/releasenotes/transmit5
https://help.panic.com/releasenotes/transmit5/
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
https://linux.oracle.com/cve/CVE-2023-48795.html
https://linux.oracle.com/errata/ELSA-2024-12164.html
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
https://matt.ucc.asn.au/dropbear/CHANGES
https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
https://news.ycombinator.com/item?id=38684904
https://news.ycombinator.com/item?id=38685286
https://news.ycombinator.com/item?id=38732005
https://nova.app/releases/#v11.8
https://nvd.nist.gov/vuln/detail/CVE-2023-48795
https://oryx-embedded.com/download/#changelog
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
https://roumenpetrov.info/secsh/#news20231220
https://security-tracker.debian.org/tracker/CVE-2023-48795
https://security-tracker.debian.org/tracker/source-package/libssh2
https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
https://security.gentoo.org/glsa/202312-16
https://security.gentoo.org/glsa/202312-17
https://security.netapp.com/advisory/ntap-20240105-0004
https://security.netapp.com/advisory/ntap-20240105-0004/
https://support.apple.com/kb/HT214084
https://terrapin-attack.com/
https://thorntech.com/cve-2023-48795-and-sftp-gateway
https://thorntech.com/cve-2023-48795-and-sftp-gateway/
https://twitter.com/TrueSkrillor/status/1736774389725565005
https://ubuntu.com/security/CVE-2023-48795
https://ubuntu.com/security/notices/USN-6560-1
https://ubuntu.com/security/notices/USN-6560-2
https://ubuntu.com/security/notices/USN-6561-1
https://ubuntu.com/security/notices/USN-6585-1
https://ubuntu.com/security/notices/USN-6589-1
https://ubuntu.com/security/notices/USN-6598-1
https://winscp.net/eng/docs/history#6.2.2
https://www.bitvise.com/ssh-client-version-history#933
https://www.bitvise.com/ssh-server-version-history
https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
https://www.cve.org/CVERecord?id=CVE-2023-48795
https://www.debian.org/security/2023/dsa-5586
https://www.debian.org/security/2023/dsa-5588
https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
https://www.netsarang.com/en/xshell-update-history
https://www.netsarang.com/en/xshell-update-history/
https://www.openssh.com/openbsd.html
https://www.openssh.com/txt/release-9.6
https://www.openwall.com/lists/oss-security/2023/12/18/2
https://www.openwall.com/lists/oss-security/2023/12/18/3
https://www.openwall.com/lists/oss-security/2023/12/20/3
https://www.paramiko.org/changelog.html
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
https://www.terrapin-attack.com
https://www.theregister.com/2023/12/20/terrapin_attack_ssh
https://www.vandyke.com/products/securecrt/history.txt
|
| libssh2 |
CVE-2023-6918 |
LOW |
1.8.0-4.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2023-6918
https://bugzilla.redhat.com/show_bug.cgi?id=2254997
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6918
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
https://nvd.nist.gov/vuln/detail/CVE-2023-6918
https://ubuntu.com/security/notices/USN-6592-1
https://ubuntu.com/security/notices/USN-6592-2
https://www.cve.org/CVERecord?id=CVE-2023-6918
https://www.libssh.org/2023/12/18/libssh-0-10-6-and-libssh-0-9-8-security-releases/
https://www.libssh.org/security/advisories/CVE-2023-6918.txt
|
| libstdc++ |
CVE-2014-5044 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
https://nvd.nist.gov/vuln/detail/CVE-2014-5044
https://www.cve.org/CVERecord?id=CVE-2014-5044
|
| libstdc++ |
CVE-2018-20673 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20673
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
https://www.cve.org/CVERecord?id=CVE-2018-20673
|
| libstdc++ |
CVE-2019-16276 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://nvd.nist.gov/vuln/detail/CVE-2019-16276
https://security.netapp.com/advisory/ntap-20191122-0004/
https://www.cve.org/CVERecord?id=CVE-2019-16276
|
| libstdc++ |
CVE-2020-16845 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002
https://security.netapp.com/advisory/ntap-20200924-0002/
https://ubuntu.com/security/notices/USN-5725-1
https://ubuntu.com/security/notices/USN-5725-2
https://www.cve.org/CVERecord?id=CVE-2020-16845
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| libstdc++ |
CVE-2020-24553 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://groups.google.com/forum/#%21topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.cve.org/CVERecord?id=CVE-2020-24553
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| libstdc++ |
CVE-2020-28362 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
https://www.cve.org/CVERecord?id=CVE-2020-28362
|
| libstdc++ |
CVE-2020-28366 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://go.dev/cl/269658
https://go.dev/issue/42559
https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://pkg.go.dev/vuln/GO-2022-0475
https://www.cve.org/CVERecord?id=CVE-2020-28366
|
| libstdc++ |
CVE-2020-28367 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://go.dev/cl/267277
https://go.dev/issue/42556
https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://pkg.go.dev/vuln/GO-2022-0476
https://www.cve.org/CVERecord?id=CVE-2020-28367
|
| libstdc++ |
CVE-2021-27918 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
https://security.gentoo.org/glsa/202208-02
https://www.cve.org/CVERecord?id=CVE-2021-27918
|
| libstdc++ |
CVE-2021-42574 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://bugzilla.redhat.com/show_bug.cgi?id=2005819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574
https://errata.rockylinux.org/RLSA-2021:4585
https://github.com/rust-lang/rust/commit/dd61274930ec0cd17711fab52d2bc9ad3e9053de (1.56.1)
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-42574
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42574
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.openwall.com/lists/oss-security/2021/11/01/1
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.starwindsoftware.com/security/sw-20220804-0002/
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| libstdc++ |
CVE-2021-42694 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://nvd.nist.gov/vuln/detail/CVE-2021-42694
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42694
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
|
| libstdc++ |
CVE-2015-5276 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
https://nvd.nist.gov/vuln/detail/CVE-2015-5276
https://www.cve.org/CVERecord?id=CVE-2015-5276
|
| libstdc++ |
CVE-2016-2226 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://nvd.nist.gov/vuln/detail/CVE-2016-2226
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-2226
https://www.exploit-db.com/exploits/42386/
|
| libstdc++ |
CVE-2016-4487 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4487
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4487
|
| libstdc++ |
CVE-2016-4488 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4488
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4488
|
| libstdc++ |
CVE-2016-4489 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://nvd.nist.gov/vuln/detail/CVE-2016-4489
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4489
|
| libstdc++ |
CVE-2016-4490 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://nvd.nist.gov/vuln/detail/CVE-2016-4490
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4490
|
| libstdc++ |
CVE-2016-4491 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4491
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4491
|
| libstdc++ |
CVE-2016-4492 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=03ef0c6c55ab81002abef62cec430d0496c3a01c
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4492
|
| libstdc++ |
CVE-2016-4493 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4493
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4493
|
| libstdc++ |
CVE-2018-20657 |
LOW |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20657
https://support.f5.com/csp/article/K62602089
https://www.cve.org/CVERecord?id=CVE-2018-20657
|
| libstdc++ |
CVE-2019-14250 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-14250
|
| libstdc++ |
CVE-2021-3826 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6372
https://access.redhat.com/security/cve/CVE-2021-3826
https://bugzilla.redhat.com/2122627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
https://errata.almalinux.org/9/ALSA-2023-6372.html
https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987
https://linux.oracle.com/cve/CVE-2021-3826.html
https://linux.oracle.com/errata/ELSA-2023-6372.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2021-3826
https://www.cve.org/CVERecord?id=CVE-2021-3826
|
| libstdc++ |
CVE-2021-46195 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8415
https://access.redhat.com/security/cve/CVE-2021-46195
https://bugzilla.redhat.com/2046300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195
https://errata.almalinux.org/9/ALSA-2022-8415.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=f10bec5ffa487ad3033ed5f38cfd0fc7d696deab
https://linux.oracle.com/cve/CVE-2021-46195.html
https://linux.oracle.com/errata/ELSA-2022-8415.html
https://nvd.nist.gov/vuln/detail/CVE-2021-46195
https://www.cve.org/CVERecord?id=CVE-2021-46195
|
| libstdc++ |
CVE-2022-27943 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-27943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
|
| libstdc++-devel |
CVE-2014-5044 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2014/07/23/7
http://www.openwall.com/lists/oss-security/2014/07/24/1
http://www.openwall.com/lists/oss-security/2014/07/31/6
https://access.redhat.com/security/cve/CVE-2014-5044
https://bugzilla.redhat.com/show_bug.cgi?id=1122812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044
https://exchange.xforce.ibmcloud.com/vulnerabilities/94849
https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721
https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
https://nvd.nist.gov/vuln/detail/CVE-2014-5044
https://www.cve.org/CVERecord?id=CVE-2014-5044
|
| libstdc++-devel |
CVE-2018-20673 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106454
https://access.redhat.com/security/cve/CVE-2018-20673
https://linux.oracle.com/cve/CVE-2018-20673.html
https://linux.oracle.com/errata/ELSA-2021-4386.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20673
https://sourceware.org/bugzilla/show_bug.cgi?id=24039
https://www.cve.org/CVERecord?id=CVE-2018-20673
|
| libstdc++-devel |
CVE-2019-16276 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html
https://access.redhat.com/errata/RHSA-2020:0101
https://access.redhat.com/errata/RHSA-2020:0329
https://access.redhat.com/errata/RHSA-2020:0652
https://access.redhat.com/security/cve/CVE-2019-16276
https://github.com/golang/go/issues/34540
https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://groups.google.com/forum/#%21msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ
https://linux.oracle.com/cve/CVE-2019-16276.html
https://linux.oracle.com/errata/ELSA-2020-0329.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/
https://nvd.nist.gov/vuln/detail/CVE-2019-16276
https://security.netapp.com/advisory/ntap-20191122-0004/
https://www.cve.org/CVERecord?id=CVE-2019-16276
|
| libstdc++-devel |
CVE-2020-16845 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html
https://access.redhat.com/security/cve/CVE-2020-16845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845
https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b
https://github.com/ulikunitz/xz/issues/35
https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/forum/#%21topic/golang-announce/NyPIaucMgXo
https://groups.google.com/forum/#%21topic/golang-announce/_ulYYcIWg3Q
https://groups.google.com/g/golang-announce/c/NyPIaucMgXo
https://linux.oracle.com/cve/CVE-2020-16845.html
https://linux.oracle.com/errata/ELSA-2020-5828.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4
https://nvd.nist.gov/vuln/detail/CVE-2020-16845
https://security.netapp.com/advisory/ntap-20200924-0002
https://security.netapp.com/advisory/ntap-20200924-0002/
https://ubuntu.com/security/notices/USN-5725-1
https://ubuntu.com/security/notices/USN-5725-2
https://www.cve.org/CVERecord?id=CVE-2020-16845
https://www.debian.org/security/2021/dsa-4848
https://www.oracle.com/security-alerts/cpuApr2021.html
|
| libstdc++-devel |
CVE-2020-24553 |
MEDIUM |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html
http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2020/Sep/5
https://access.redhat.com/security/cve/CVE-2020-24553
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553
https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs
https://groups.google.com/forum/#%21topic/golang-announce/8wqlSbkLdPs
https://linux.oracle.com/cve/CVE-2020-24553.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/
https://nvd.nist.gov/vuln/detail/CVE-2020-24553
https://security.netapp.com/advisory/ntap-20200924-0003/
https://ubuntu.com/security/notices/USN-4758-1
https://www.cve.org/CVERecord?id=CVE-2020-24553
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| libstdc++-devel |
CVE-2020-28362 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI
https://linux.oracle.com/cve/CVE-2020-28362.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd%40%3Cissues.trafficcontrol.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/
https://nvd.nist.gov/vuln/detail/CVE-2020-28362
https://security.netapp.com/advisory/ntap-20201202-0004/
https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
https://www.cve.org/CVERecord?id=CVE-2020-28362
|
| libstdc++-devel |
CVE-2020-28366 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28366
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366
https://go.dev/cl/269658
https://go.dev/issue/42559
https://go.googlesource.com/go/+/062e0e5ce6df339dc26732438ad771f73dbf2292
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28366.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28366
https://pkg.go.dev/vuln/GO-2022-0475
https://www.cve.org/CVERecord?id=CVE-2020-28366
|
| libstdc++-devel |
CVE-2020-28367 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-28367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367
https://go.dev/cl/267277
https://go.dev/issue/42556
https://go.googlesource.com/go/+/da7aa86917811a571e6634b45a457f918b8e6561
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ
https://linux.oracle.com/cve/CVE-2020-28367.html
https://linux.oracle.com/errata/ELSA-2020-5493.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28367
https://pkg.go.dev/vuln/GO-2022-0476
https://www.cve.org/CVERecord?id=CVE-2020-28367
|
| libstdc++-devel |
CVE-2021-27918 |
MEDIUM |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-27918
https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw
https://linux.oracle.com/cve/CVE-2021-27918.html
https://linux.oracle.com/errata/ELSA-2021-9268.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27918
https://security.gentoo.org/glsa/202208-02
https://www.cve.org/CVERecord?id=CVE-2021-27918
|
| libstdc++-devel |
CVE-2021-42574 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/4
http://www.openwall.com/lists/oss-security/2021/11/01/5
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.openwall.com/lists/oss-security/2021/11/02/10
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42574
https://bugzilla.redhat.com/show_bug.cgi?id=2005819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574
https://errata.rockylinux.org/RLSA-2021:4585
https://github.com/rust-lang/rust/commit/dd61274930ec0cd17711fab52d2bc9ad3e9053de (1.56.1)
https://linux.oracle.com/cve/CVE-2021-42574.html
https://linux.oracle.com/errata/ELSA-2021-4743.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
https://nvd.nist.gov/vuln/detail/CVE-2021-42574
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42574
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.openwall.com/lists/oss-security/2021/11/01/1
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.starwindsoftware.com/security/sw-20220804-0002/
https://www.unicode.org/reports/tr31/
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing
https://www.unicode.org/reports/tr39/
https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| libstdc++-devel |
CVE-2021-42694 |
MEDIUM |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2021/11/01/1
http://www.openwall.com/lists/oss-security/2021/11/01/6
http://www.unicode.org/versions/Unicode14.0.0/
https://access.redhat.com/security/cve/CVE-2021-42694
https://cwe.mitre.org/data/definitions/1007.html
https://nvd.nist.gov/vuln/detail/CVE-2021-42694
https://security.gentoo.org/glsa/202210-09
https://trojansource.codes
https://trojansource.codes/
https://www.cve.org/CVERecord?id=CVE-2021-42694
https://www.kb.cert.org/vuls/id/999008
https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/
https://www.scyon.nl/post/trojans-in-your-source-code
https://www.unicode.org/reports/tr36/
https://www.unicode.org/reports/tr36/#Canonical_Represenation
https://www.unicode.org/reports/tr39/
|
| libstdc++-devel |
CVE-2015-5276 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html
http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html
http://www.securitytracker.com/id/1034375
https://access.redhat.com/security/cve/CVE-2015-5276
https://bugzilla.redhat.com/show_bug.cgi?id=1262846
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142
https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
https://nvd.nist.gov/vuln/detail/CVE-2015-5276
https://www.cve.org/CVERecord?id=CVE-2015-5276
|
| libstdc++-devel |
CVE-2016-2226 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90103
https://access.redhat.com/security/cve/CVE-2016-2226
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687
https://nvd.nist.gov/vuln/detail/CVE-2016-2226
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-2226
https://www.exploit-db.com/exploits/42386/
|
| libstdc++-devel |
CVE-2016-4487 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4487
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4487
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4487
|
| libstdc++-devel |
CVE-2016-4488 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90025
https://access.redhat.com/security/cve/CVE-2016-4488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481
https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4488
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4488
|
| libstdc++-devel |
CVE-2016-4489 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90017
https://access.redhat.com/security/cve/CVE-2016-4489
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492
https://nvd.nist.gov/vuln/detail/CVE-2016-4489
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4489
|
| libstdc++-devel |
CVE-2016-4490 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90019
https://access.redhat.com/security/cve/CVE-2016-4490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498
https://nvd.nist.gov/vuln/detail/CVE-2016-4490
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4490
|
| libstdc++-devel |
CVE-2016-4491 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90016
https://access.redhat.com/security/cve/CVE-2016-4491
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4491
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4491
|
| libstdc++-devel |
CVE-2016-4492 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=03ef0c6c55ab81002abef62cec430d0496c3a01c
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4492
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4492
|
| libstdc++-devel |
CVE-2016-4493 |
LOW |
4.8.5-44.el7 |
|
http://www.openwall.com/lists/oss-security/2016/05/05/5
http://www.securityfocus.com/bid/90014
https://access.redhat.com/security/cve/CVE-2016-4493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926
https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4493
https://ubuntu.com/security/notices/USN-3337-1
https://ubuntu.com/security/notices/USN-3367-1
https://ubuntu.com/security/notices/USN-3368-1
https://ubuntu.com/security/notices/USN-4336-2
https://www.cve.org/CVERecord?id=CVE-2016-4493
|
| libstdc++-devel |
CVE-2018-20657 |
LOW |
4.8.5-44.el7 |
|
http://www.securityfocus.com/bid/106444
https://access.redhat.com/errata/RHSA-2019:3352
https://access.redhat.com/security/cve/CVE-2018-20657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539
https://linux.oracle.com/cve/CVE-2018-20657.html
https://linux.oracle.com/errata/ELSA-2019-3352.html
https://nvd.nist.gov/vuln/detail/CVE-2018-20657
https://support.f5.com/csp/article/K62602089
https://www.cve.org/CVERecord?id=CVE-2018-20657
|
| libstdc++-devel |
CVE-2019-14250 |
LOW |
4.8.5-44.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html
http://www.securityfocus.com/bid/109354
https://access.redhat.com/security/cve/CVE-2019-14250
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924
https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-14250
https://security.gentoo.org/glsa/202007-39
https://security.netapp.com/advisory/ntap-20190822-0002/
https://ubuntu.com/security/notices/USN-4326-1
https://ubuntu.com/security/notices/USN-4336-1
https://ubuntu.com/security/notices/USN-4336-2
https://usn.ubuntu.com/4326-1/
https://usn.ubuntu.com/4336-1/
https://www.cve.org/CVERecord?id=CVE-2019-14250
|
| libstdc++-devel |
CVE-2021-3826 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6372
https://access.redhat.com/security/cve/CVE-2021-3826
https://bugzilla.redhat.com/2122627
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826
https://errata.almalinux.org/9/ALSA-2023-6372.html
https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=5481040197402be6dfee265bd2ff5a4c88e30505
https://gcc.gnu.org/pipermail/gcc-patches/2021-September/579987
https://linux.oracle.com/cve/CVE-2021-3826.html
https://linux.oracle.com/errata/ELSA-2023-6372.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2021-3826
https://www.cve.org/CVERecord?id=CVE-2021-3826
|
| libstdc++-devel |
CVE-2021-46195 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/errata/RHSA-2022:8415
https://access.redhat.com/security/cve/CVE-2021-46195
https://bugzilla.redhat.com/2046300
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195
https://errata.almalinux.org/9/ALSA-2022-8415.html
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=f10bec5ffa487ad3033ed5f38cfd0fc7d696deab
https://linux.oracle.com/cve/CVE-2021-46195.html
https://linux.oracle.com/errata/ELSA-2022-8415.html
https://nvd.nist.gov/vuln/detail/CVE-2021-46195
https://www.cve.org/CVERecord?id=CVE-2021-46195
|
| libstdc++-devel |
CVE-2022-27943 |
LOW |
4.8.5-44.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-27943
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27943
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
https://nvd.nist.gov/vuln/detail/CVE-2022-27943
https://sourceware.org/bugzilla/show_bug.cgi?id=28995
https://www.cve.org/CVERecord?id=CVE-2022-27943
|
| libtasn1 |
CVE-2016-4008 |
MEDIUM |
4.10-1.el7 |
|
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html
http://www.debian.org/security/2016/dsa-3568
http://www.openwall.com/lists/oss-security/2016/04/11/3
http://www.ubuntu.com/usn/USN-2957-1
http://www.ubuntu.com/usn/USN-2957-2
https://access.redhat.com/security/cve/CVE-2016-4008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008
https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
https://security.gentoo.org/glsa/201703-05
https://ubuntu.com/security/notices/USN-2957-1
https://ubuntu.com/security/notices/USN-2957-2
https://www.cve.org/CVERecord?id=CVE-2016-4008
|
| libtasn1 |
CVE-2018-6003 |
MEDIUM |
4.10-1.el7 |
|
http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97
https://access.redhat.com/security/cve/CVE-2018-6003
https://bugzilla.redhat.com/show_bug.cgi?id=1535926
https://bugzilla.suse.com/show_bug.cgi?id=1076832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6003
https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-6003
https://ubuntu.com/security/notices/USN-3547-1
https://www.cve.org/CVERecord?id=CVE-2018-6003
https://www.debian.org/security/2018/dsa-4106
|
| libtasn1 |
CVE-2021-46848 |
MEDIUM |
4.10-1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:0343
https://access.redhat.com/security/cve/CVE-2021-46848
https://bugs.gentoo.org/866237
https://bugzilla.redhat.com/2140058
https://bugzilla.redhat.com/show_bug.cgi?id=2140058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46848
https://errata.almalinux.org/9/ALSA-2023-0343.html
https://errata.rockylinux.org/RLSA-2023:0343
https://gitlab.com/gnutls/libtasn1/-/commit/44a700d2051a666235748970c2df047ff207aeb5
https://gitlab.com/gnutls/libtasn1/-/issues/32
https://linux.oracle.com/cve/CVE-2021-46848.html
https://linux.oracle.com/errata/ELSA-2023-0343.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AV4SHDJF2XLB4CUPTBPQQ6CLGZ5LKXPZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECM2ELTVRYV4BZ5L5GMIRQE27RFHPAQ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGO7XST4EIJGX4B2ITZCYSWM24534BSU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V5LWOGF7QRMNFRUCZY6TDYQJVFI6MOQ2/
https://nvd.nist.gov/vuln/detail/CVE-2021-46848
https://security.netapp.com/advisory/ntap-20221118-0006/
https://ubuntu.com/security/notices/USN-5707-1
https://www.cve.org/CVERecord?id=CVE-2021-46848
|
| libtasn1 |
CVE-2017-10790 |
LOW |
4.10-1.el7 |
|
https://access.redhat.com/security/cve/CVE-2017-10790
https://bugzilla.redhat.com/show_bug.cgi?id=1464141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10790
https://security.gentoo.org/glsa/201710-11
https://ubuntu.com/security/notices/USN-3547-1
https://usn.ubuntu.com/3547-1/
https://www.cve.org/CVERecord?id=CVE-2017-10790
https://www.debian.org/security/2018/dsa-4106
|
| libtasn1 |
CVE-2017-6891 |
LOW |
4.10-1.el7 |
|
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=5520704d075802df25ce4ffccc010ba1641bd484
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.debian.org/security/2017/dsa-3861
http://www.securityfocus.com/bid/98641
http://www.securitytracker.com/id/1038619
https://access.redhat.com/security/cve/CVE-2017-6891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6891
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-6891
https://secuniaresearch.flexerasoftware.com/advisories/76125/
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/
https://security.gentoo.org/glsa/201710-11
https://ubuntu.com/security/notices/USN-3309-1
https://ubuntu.com/security/notices/USN-3309-2
https://www.cve.org/CVERecord?id=CVE-2017-6891
|
| libtasn1 |
CVE-2018-1000654 |
LOW |
4.10-1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-1000654
https://ubuntu.com/security/notices/USN-5352-1
https://www.cve.org/CVERecord?id=CVE-2018-1000654
|
| libtasn1-devel |
CVE-2016-4008 |
MEDIUM |
4.10-1.el7 |
|
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=f435825c0f527a8e52e6ffbc3ad0bc60531d537e
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html
http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html
http://www.debian.org/security/2016/dsa-3568
http://www.openwall.com/lists/oss-security/2016/04/11/3
http://www.ubuntu.com/usn/USN-2957-1
http://www.ubuntu.com/usn/USN-2957-2
https://access.redhat.com/security/cve/CVE-2016-4008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008
https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4008
https://security.gentoo.org/glsa/201703-05
https://ubuntu.com/security/notices/USN-2957-1
https://ubuntu.com/security/notices/USN-2957-2
https://www.cve.org/CVERecord?id=CVE-2016-4008
|
| libtasn1-devel |
CVE-2018-6003 |
MEDIUM |
4.10-1.el7 |
|
http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97
https://access.redhat.com/security/cve/CVE-2018-6003
https://bugzilla.redhat.com/show_bug.cgi?id=1535926
https://bugzilla.suse.com/show_bug.cgi?id=1076832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6003
https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-6003
https://ubuntu.com/security/notices/USN-3547-1
https://www.cve.org/CVERecord?id=CVE-2018-6003
https://www.debian.org/security/2018/dsa-4106
|
| libtasn1-devel |
CVE-2021-46848 |
MEDIUM |
4.10-1.el7 |
|
https://access.redhat.com/errata/RHSA-2023:0343
https://access.redhat.com/security/cve/CVE-2021-46848
https://bugs.gentoo.org/866237
https://bugzilla.redhat.com/2140058
https://bugzilla.redhat.com/show_bug.cgi?id=2140058
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46848
https://errata.almalinux.org/9/ALSA-2023-0343.html
https://errata.rockylinux.org/RLSA-2023:0343
https://gitlab.com/gnutls/libtasn1/-/commit/44a700d2051a666235748970c2df047ff207aeb5
https://gitlab.com/gnutls/libtasn1/-/issues/32
https://linux.oracle.com/cve/CVE-2021-46848.html
https://linux.oracle.com/errata/ELSA-2023-0343.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AV4SHDJF2XLB4CUPTBPQQ6CLGZ5LKXPZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECM2ELTVRYV4BZ5L5GMIRQE27RFHPAQ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGO7XST4EIJGX4B2ITZCYSWM24534BSU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V5LWOGF7QRMNFRUCZY6TDYQJVFI6MOQ2/
https://nvd.nist.gov/vuln/detail/CVE-2021-46848
https://security.netapp.com/advisory/ntap-20221118-0006/
https://ubuntu.com/security/notices/USN-5707-1
https://www.cve.org/CVERecord?id=CVE-2021-46848
|
| libtasn1-devel |
CVE-2017-10790 |
LOW |
4.10-1.el7 |
|
https://access.redhat.com/security/cve/CVE-2017-10790
https://bugzilla.redhat.com/show_bug.cgi?id=1464141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10790
https://security.gentoo.org/glsa/201710-11
https://ubuntu.com/security/notices/USN-3547-1
https://usn.ubuntu.com/3547-1/
https://www.cve.org/CVERecord?id=CVE-2017-10790
https://www.debian.org/security/2018/dsa-4106
|
| libtasn1-devel |
CVE-2017-6891 |
LOW |
4.10-1.el7 |
|
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=5520704d075802df25ce4ffccc010ba1641bd484
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.debian.org/security/2017/dsa-3861
http://www.securityfocus.com/bid/98641
http://www.securitytracker.com/id/1038619
https://access.redhat.com/security/cve/CVE-2017-6891
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6891
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-6891
https://secuniaresearch.flexerasoftware.com/advisories/76125/
https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/
https://security.gentoo.org/glsa/201710-11
https://ubuntu.com/security/notices/USN-3309-1
https://ubuntu.com/security/notices/USN-3309-2
https://www.cve.org/CVERecord?id=CVE-2017-6891
|
| libtasn1-devel |
CVE-2018-1000654 |
LOW |
4.10-1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html
http://www.securityfocus.com/bid/105151
https://access.redhat.com/security/cve/CVE-2018-1000654
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654
https://gitlab.com/gnutls/libtasn1/issues/4
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-1000654
https://ubuntu.com/security/notices/USN-5352-1
https://www.cve.org/CVERecord?id=CVE-2018-1000654
|
| libuuid |
CVE-2014-9114 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
http://www.openwall.com/lists/oss-security/2014/11/26/13
http://www.openwall.com/lists/oss-security/2014/11/26/21
http://www.securityfocus.com/bid/71327
https://access.redhat.com/security/cve/CVE-2014-9114
https://bugzilla.redhat.com/show_bug.cgi?id=1168485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114
https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-9114
https://security.gentoo.org/glsa/201612-14
https://www.cve.org/CVERecord?id=CVE-2014-9114
|
| libuuid |
CVE-2016-2779 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://nvd.nist.gov/vuln/detail/CVE-2016-2779
https://www.cve.org/CVERecord?id=CVE-2016-2779
|
| libuuid |
CVE-2020-21583 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-21583
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21583
https://nvd.nist.gov/vuln/detail/CVE-2020-21583
https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html
https://www.cve.org/CVERecord?id=CVE-2020-21583
|
| libuuid |
CVE-2022-0563 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
|
| libuuid |
CVE-2015-5218 |
LOW |
2.23.2-65.el7_9.1 |
|
http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
http://www.spinics.net/lists/util-linux-ng/msg11873.html
https://access.redhat.com/security/cve/CVE-2015-5218
https://bugzilla.redhat.com/show_bug.cgi?id=1259322
https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
https://nvd.nist.gov/vuln/detail/CVE-2015-5218
https://www.cve.org/CVERecord?id=CVE-2015-5218
https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
|
| libuuid |
CVE-2021-37600 |
LOW |
2.23.2-65.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2021-37600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20210902-0002/
https://www.cve.org/CVERecord?id=CVE-2021-37600
|
| libxml2 |
CVE-2016-3709 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
https://access.redhat.com/errata/RHSA-2022:7715
https://access.redhat.com/security/cve/CVE-2016-3709
https://bugzilla.redhat.com/2112766
https://bugzilla.redhat.com/show_bug.cgi?id=2112766
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3709
https://errata.almalinux.org/8/ALSA-2022-7715.html
https://errata.rockylinux.org/RLSA-2022:7715
https://linux.oracle.com/cve/CVE-2016-3709.html
https://linux.oracle.com/errata/ELSA-2022-7715.html
https://mail.gnome.org/archives/xml/2018-January/msg00010.html
https://nvd.nist.gov/vuln/detail/CVE-2016-3709
https://ubuntu.com/security/notices/USN-5548-1
https://www.cve.org/CVERecord?id=CVE-2016-3709
|
| libxml2 |
CVE-2016-4483 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://rhn.redhat.com/errata/RHSA-2016-2957.html
http://www.debian.org/security/2016/dsa-3593
http://www.openwall.com/lists/oss-security/2016/05/03/8
http://www.openwall.com/lists/oss-security/2016/05/04/7
http://www.openwall.com/lists/oss-security/2016/06/07/4
http://www.openwall.com/lists/oss-security/2016/06/07/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/90013
http://www.securitytracker.com/id/1036348
https://access.redhat.com/security/cve/CVE-2016-4483
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483
https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-4483
https://security.gentoo.org/glsa/201701-37
https://ubuntu.com/security/notices/USN-2994-1
https://www.cve.org/CVERecord?id=CVE-2016-4483
https://www.tenable.com/security/tns-2016-18
|
| libxml2 |
CVE-2016-9318 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://www.securityfocus.com/bid/94347
https://access.redhat.com/security/cve/CVE-2016-9318
https://bugzilla.gnome.org/show_bug.cgi?id=772726
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318
https://github.com/lsh123/xmlsec/issues/43
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2016-9318
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3739-1
https://ubuntu.com/security/notices/USN-3739-2
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/3739-2/
https://www.cve.org/CVERecord?id=CVE-2016-9318
|
| libxml2 |
CVE-2017-0663 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://www.debian.org/security/2017/dsa-3952
http://www.securityfocus.com/bid/98877
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2017-0663
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0663
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-0663
https://security.gentoo.org/glsa/201711-01
https://source.android.com/security/bulletin/2017-06-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://www.cve.org/CVERecord?id=CVE-2017-0663
|
| libxml2 |
CVE-2017-16931 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16931
https://bugzilla.gnome.org/show_bug.cgi?id=766956
https://github.com/GNOME/libxml2/commit/e26630548e7d138d2c560844c43820b6767251e3
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16931
https://www.cve.org/CVERecord?id=CVE-2017-16931
https://www.oracle.com//security-alerts/cpujul2021.html
|
| libxml2 |
CVE-2017-16932 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://xmlsoft.org/news.html
https://access.redhat.com/security/cve/CVE-2017-16932
https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html
https://bugzilla.gnome.org/show_bug.cgi?id=759579
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932
https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2017-16932.yml
https://github.com/sparklemotion/nokogiri/issues/1714
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-16932
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html
https://ubuntu.com/security/notices/USN-3504-1
https://ubuntu.com/security/notices/USN-3504-2
https://ubuntu.com/security/notices/USN-3739-1
https://usn.ubuntu.com/3739-1
https://usn.ubuntu.com/3739-1/
https://usn.ubuntu.com/usn/usn-3504-1/
https://www.cve.org/CVERecord?id=CVE-2017-16932
|
| libxml2 |
CVE-2017-7375 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://www.securityfocus.com/bid/98877
http://www.securitytracker.com/id/1038623
https://access.redhat.com/security/cve/CVE-2017-7375
https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa
https://bugzilla.redhat.com/show_bug.cgi?id=1462203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7375
https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e
https://nvd.nist.gov/vuln/detail/CVE-2017-7375
https://security.gentoo.org/glsa/201711-01
https://source.android.com/security/bulletin/2017-06-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://www.cve.org/CVERecord?id=CVE-2017-7375
https://www.debian.org/security/2017/dsa-3952
|
| libxml2 |
CVE-2017-9047 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98599
https://access.redhat.com/security/cve/CVE-2017-9047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-9047
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://www.cve.org/CVERecord?id=CVE-2017-9047
|
| libxml2 |
CVE-2017-9049 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98601
https://access.redhat.com/security/cve/CVE-2017-9049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-9049
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://www.cve.org/CVERecord?id=CVE-2017-9049
|
| libxml2 |
CVE-2017-9050 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98568
https://access.redhat.com/security/cve/CVE-2017-9050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050
https://github.com/sparklemotion/nokogiri/issues/1673
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-9050
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-0663.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7375.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-7376.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9047.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9048.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9049.html
https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9050.html
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://usn.ubuntu.com/usn/usn-3424-1/
https://www.cve.org/CVERecord?id=CVE-2017-9050
|
| libxml2 |
CVE-2020-24977 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html
https://access.redhat.com/security/cve/CVE-2020-24977
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977
https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
https://linux.oracle.com/cve/CVE-2020-24977.html
https://linux.oracle.com/errata/ELSA-2021-1597.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/
https://nvd.nist.gov/vuln/detail/CVE-2020-24977
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20200924-0001/
https://ubuntu.com/security/notices/USN-4991-1
https://www.cve.org/CVERecord?id=CVE-2020-24977
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2 |
CVE-2021-3516 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3516
https://bugzilla.redhat.com/show_bug.cgi?id=1954225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539
https://gitlab.gnome.org/GNOME/libxml2/-/issues/230
https://linux.oracle.com/cve/CVE-2021-3516.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3516
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210716-0005/
https://ubuntu.com/security/notices/USN-4991-1
https://www.cve.org/CVERecord?id=CVE-2021-3516
https://www.oracle.com/security-alerts/cpujan2022.html
|
| libxml2 |
CVE-2021-3517 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3517
https://bugzilla.redhat.com/show_bug.cgi?id=1954232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-3517.yml
https://github.com/sparklemotion/nokogiri
https://github.com/sparklemotion/nokogiri/blob/7c19ef5cc6b7c5c36827dd5495f857c6877ec8cf/CHANGELOG.md?plain=1#L579
https://github.com/sparklemotion/nokogiri/issues/2233
https://github.com/sparklemotion/nokogiri/issues/2274
https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e
https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2
https://gitlab.gnome.org/GNOME/libxml2/-/issues/235
https://linux.oracle.com/cve/CVE-2021-3517.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nvd.nist.gov/vuln/detail/CVE-2021-3517
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002
https://security.netapp.com/advisory/ntap-20210625-0002/
https://security.netapp.com/advisory/ntap-20211022-0004
https://security.netapp.com/advisory/ntap-20211022-0004/
https://ubuntu.com/security/notices/USN-4991-1
https://www.cve.org/CVERecord?id=CVE-2021-3517
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2 |
CVE-2021-3518 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://seclists.org/fulldisclosure/2021/Jul/54
http://seclists.org/fulldisclosure/2021/Jul/55
http://seclists.org/fulldisclosure/2021/Jul/58
http://seclists.org/fulldisclosure/2021/Jul/59
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3518
https://bugzilla.redhat.com/show_bug.cgi?id=1954242
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518
https://github.com/advisories/GHSA-v4f8-2847-rwm7
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-3518.yml
https://github.com/sparklemotion/nokogiri
https://github.com/sparklemotion/nokogiri/blob/2edbbef95f1dc12c1ddc5ebda71b9159026245fe/CHANGELOG.md?plain=1#L722
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7
https://gitlab.gnome.org/GNOME/libxml2/-/issues/237
https://linux.oracle.com/cve/CVE-2021-3518.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nokogiri.org/CHANGELOG.html#1114-2021-05-14
https://nokogiri.org/CHANGELOG.html#security_8
https://nvd.nist.gov/vuln/detail/CVE-2021-3518
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002
https://security.netapp.com/advisory/ntap-20210625-0002/
https://support.apple.com/kb/HT212601
https://support.apple.com/kb/HT212602
https://support.apple.com/kb/HT212604
https://support.apple.com/kb/HT212605
https://ubuntu.com/security/notices/USN-4991-1
https://www.cve.org/CVERecord?id=CVE-2021-3518
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2 |
CVE-2021-3537 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3537
https://bugzilla.redhat.com/show_bug.cgi?id=1956522
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537
https://github.com/advisories/GHSA-286v-pcf5-25rc
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-3537.yml
https://github.com/sparklemotion/nokogiri
https://github.com/sparklemotion/nokogiri/blob/2edbbef95f1dc12c1ddc5ebda71b9159026245fe/CHANGELOG.md?plain=1#L722
https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61
https://gitlab.gnome.org/GNOME/libxml2/-/issues/243
https://gitlab.gnome.org/GNOME/libxml2/-/issues/244
https://gitlab.gnome.org/GNOME/libxml2/-/issues/245
https://linux.oracle.com/cve/CVE-2021-3537.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
https://nokogiri.org/CHANGELOG.html#1114-2021-05-14
https://nokogiri.org/CHANGELOG.html#security_8
https://nvd.nist.gov/vuln/detail/CVE-2021-3537
https://security.gentoo.org/glsa/202107-05
https://security.netapp.com/advisory/ntap-20210625-0002
https://security.netapp.com/advisory/ntap-20210625-0002/
https://ubuntu.com/security/notices/USN-4991-1
https://www.cve.org/CVERecord?id=CVE-2021-3537
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2 |
CVE-2021-3541 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json
https://access.redhat.com/security/cve/CVE-2021-3541
https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/
https://bugzilla.redhat.com/show_bug.cgi?id=1950515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541
https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e
https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)
https://linux.oracle.com/cve/CVE-2021-3541.html
https://linux.oracle.com/errata/ELSA-2021-2569.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3541
https://security.netapp.com/advisory/ntap-20210805-0007/
https://ubuntu.com/security/notices/USN-4991-1
https://www.cve.org/CVERecord?id=CVE-2021-3541
https://www.oracle.com/security-alerts/cpujan2022.html
|
| libxml2 |
CVE-2022-23308 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/34
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/36
http://seclists.org/fulldisclosure/2022/May/37
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/security/cve/CVE-2022-23308
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308
https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e
https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS
https://linux.oracle.com/cve/CVE-2022-23308.html
https://linux.oracle.com/errata/ELSA-2022-0899.html
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/
https://nvd.nist.gov/vuln/detail/CVE-2022-23308
https://security.gentoo.org/glsa/202210-03
https://security.netapp.com/advisory/ntap-20220331-0008/
https://support.apple.com/kb/HT213253
https://support.apple.com/kb/HT213254
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://support.apple.com/kb/HT213258
https://ubuntu.com/security/notices/USN-5324-1
https://ubuntu.com/security/notices/USN-5422-1
https://www.cve.org/CVERecord?id=CVE-2022-23308
https://www.oracle.com/security-alerts/cpujul2022.html
|
| libxml2 |
CVE-2022-29824 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html
http://packetstormsecurity.com/files/169825/libxml2-xmlParseNameComplex-Integer-Overflow.html
https://access.redhat.com/security/cve/CVE-2022-29824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab
https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14)
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd
https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master)
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14
https://gitlab.gnome.org/GNOME/libxslt/-/tags
https://linux.oracle.com/cve/CVE-2022-29824.html
https://linux.oracle.com/errata/ELSA-2022-5317.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/
https://nvd.nist.gov/vuln/detail/CVE-2022-29824
https://security.gentoo.org/glsa/202210-03
https://security.netapp.com/advisory/ntap-20220715-0006/
https://ubuntu.com/security/notices/USN-5422-1
https://www.cve.org/CVERecord?id=CVE-2022-29824
https://www.debian.org/security/2022/dsa-5142
https://www.oracle.com/security-alerts/cpujul2022.html
|
| libxml2 |
CVE-2022-40303 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://seclists.org/fulldisclosure/2022/Dec/21
http://seclists.org/fulldisclosure/2022/Dec/24
http://seclists.org/fulldisclosure/2022/Dec/25
http://seclists.org/fulldisclosure/2022/Dec/26
http://seclists.org/fulldisclosure/2022/Dec/27
https://access.redhat.com/errata/RHSA-2023:0338
https://access.redhat.com/security/cve/CVE-2022-40303
https://bugzilla.redhat.com/2136266
https://bugzilla.redhat.com/2136288
https://bugzilla.redhat.com/show_bug.cgi?id=2136266
https://bugzilla.redhat.com/show_bug.cgi?id=2136288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304
https://errata.almalinux.org/9/ALSA-2023-0338.html
https://errata.rockylinux.org/RLSA-2023:0338
https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c0
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3
https://linux.oracle.com/cve/CVE-2022-40303.html
https://linux.oracle.com/errata/ELSA-2023-0338.html
https://nvd.nist.gov/vuln/detail/CVE-2022-40303
https://security.netapp.com/advisory/ntap-20221209-0003/
https://support.apple.com/kb/HT213531
https://support.apple.com/kb/HT213533
https://support.apple.com/kb/HT213534
https://support.apple.com/kb/HT213535
https://support.apple.com/kb/HT213536
https://ubuntu.com/security/notices/USN-5760-1
https://ubuntu.com/security/notices/USN-5760-2
https://www.cve.org/CVERecord?id=CVE-2022-40303
|
| libxml2 |
CVE-2022-40304 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
http://seclists.org/fulldisclosure/2022/Dec/21
http://seclists.org/fulldisclosure/2022/Dec/24
http://seclists.org/fulldisclosure/2022/Dec/25
http://seclists.org/fulldisclosure/2022/Dec/26
http://seclists.org/fulldisclosure/2022/Dec/27
https://access.redhat.com/errata/RHSA-2023:0338
https://access.redhat.com/security/cve/CVE-2022-40304
https://bugzilla.redhat.com/2136266
https://bugzilla.redhat.com/2136288
https://bugzilla.redhat.com/show_bug.cgi?id=2136266
https://bugzilla.redhat.com/show_bug.cgi?id=2136288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40303
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304
https://errata.almalinux.org/9/ALSA-2023-0338.html
https://errata.rockylinux.org/RLSA-2023:0338
https://gitlab.gnome.org/GNOME/libxml2/-/commit/1b41ec4e9433b05bb0376be4725804c54ef1d80b
https://gitlab.gnome.org/GNOME/libxml2/-/tags
https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3
https://linux.oracle.com/cve/CVE-2022-40304.html
https://linux.oracle.com/errata/ELSA-2023-0338.html
https://nvd.nist.gov/vuln/detail/CVE-2022-40304
https://security.netapp.com/advisory/ntap-20221209-0003/
https://support.apple.com/kb/HT213531
https://support.apple.com/kb/HT213533
https://support.apple.com/kb/HT213534
https://support.apple.com/kb/HT213535
https://support.apple.com/kb/HT213536
https://ubuntu.com/security/notices/USN-5760-1
https://ubuntu.com/security/notices/USN-5760-2
https://www.cve.org/CVERecord?id=CVE-2022-40304
|
| libxml2 |
CVE-2023-28484 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
https://access.redhat.com/errata/RHSA-2023:4349
https://access.redhat.com/security/cve/CVE-2023-28484
https://bugzilla.redhat.com/2185984
https://bugzilla.redhat.com/2185994
https://bugzilla.redhat.com/show_bug.cgi?id=2185984
https://bugzilla.redhat.com/show_bug.cgi?id=2185994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469
https://errata.almalinux.org/9/ALSA-2023-4349.html
https://errata.rockylinux.org/RLSA-2023:4529
https://gitlab.gnome.org/GNOME/libxml2/-/commit/4c6922f763ad958c48ff66f82823ae21f2e92ee6
https://gitlab.gnome.org/GNOME/libxml2/-/commit/647e072ea0a2f12687fa05c172f4c4713fdb0c4f
https://gitlab.gnome.org/GNOME/libxml2/-/issues/491
https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4
https://linux.oracle.com/cve/CVE-2023-28484.html
https://linux.oracle.com/errata/ELSA-2023-4529.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2023-28484
https://security.netapp.com/advisory/ntap-20230601-0006/
https://security.netapp.com/advisory/ntap-20240201-0005/
https://ubuntu.com/security/notices/USN-6028-1
https://ubuntu.com/security/notices/USN-6028-2
https://www.cve.org/CVERecord?id=CVE-2023-28484
|
| libxml2 |
CVE-2023-29469 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
https://access.redhat.com/errata/RHSA-2023:4349
https://access.redhat.com/security/cve/CVE-2023-29469
https://bugzilla.redhat.com/2185984
https://bugzilla.redhat.com/2185994
https://bugzilla.redhat.com/show_bug.cgi?id=2185984
https://bugzilla.redhat.com/show_bug.cgi?id=2185994
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469
https://errata.almalinux.org/9/ALSA-2023-4349.html
https://errata.rockylinux.org/RLSA-2023:4529
https://gitlab.gnome.org/GNOME/libxml2/-/commit/09a2dd453007f9c7205274623acdd73747c22d64
https://gitlab.gnome.org/GNOME/libxml2/-/issues/510
https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4
https://linux.oracle.com/cve/CVE-2023-29469.html
https://linux.oracle.com/errata/ELSA-2023-4529.html
https://lists.debian.org/debian-lts-announce/2023/04/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2023-29469
https://security.netapp.com/advisory/ntap-20230601-0006/
https://ubuntu.com/security/notices/USN-6028-1
https://ubuntu.com/security/notices/USN-6028-2
https://www.cve.org/CVERecord?id=CVE-2023-29469
|
| libxml2 |
CVE-2023-39615 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
https://access.redhat.com/errata/RHSA-2023:7747
https://access.redhat.com/security/cve/CVE-2023-39615
https://bugzilla.redhat.com/2235864
https://errata.almalinux.org/9/ALSA-2023-7747.html
https://gitlab.gnome.org/GNOME/libxml2/-/issues/535
https://linux.oracle.com/cve/CVE-2023-39615.html
https://linux.oracle.com/errata/ELSA-2024-0119.html
https://nvd.nist.gov/vuln/detail/CVE-2023-39615
https://www.cve.org/CVERecord?id=CVE-2023-39615
|
| libxml2 |
CVE-2024-25062 |
MEDIUM |
2.9.1-6.el7_9.6 |
|
https://access.redhat.com/security/cve/CVE-2024-25062
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062
https://gitlab.gnome.org/GNOME/libxml2/-/issues/604
https://gitlab.gnome.org/GNOME/libxml2/-/tags
https://nvd.nist.gov/vuln/detail/CVE-2024-25062
https://ubuntu.com/security/notices/USN-6658-1
https://ubuntu.com/security/notices/USN-6658-2
https://www.cve.org/CVERecord?id=CVE-2024-25062
|
| libxml2 |
CVE-2017-5969 |
LOW |
2.9.1-6.el7_9.6 |
|
http://www.openwall.com/lists/oss-security/2016/11/05/3
http://www.openwall.com/lists/oss-security/2017/02/13/1
http://www.securityfocus.com/bid/96188
https://access.redhat.com/security/cve/CVE-2017-5969
https://bugzilla.gnome.org/show_bug.cgi?id=778519
https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
https://nvd.nist.gov/vuln/detail/CVE-2017-5969
https://security.gentoo.org/glsa/201711-01
https://www.cve.org/CVERecord?id=CVE-2017-5969
|
| libxml2 |
CVE-2017-8872 |
LOW |
2.9.1-6.el7_9.6 |
|
https://access.redhat.com/security/cve/CVE-2017-8872
https://bugzilla.gnome.org/show_bug.cgi?id=775200
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872
https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2017-8872
https://ubuntu.com/security/notices/USN-4991-1
https://www.cve.org/CVERecord?id=CVE-2017-8872
|
| libxml2 |
CVE-2017-9048 |
LOW |
2.9.1-6.el7_9.6 |
|
http://www.debian.org/security/2017/dsa-3952
http://www.openwall.com/lists/oss-security/2017/05/15/1
http://www.securityfocus.com/bid/98556
https://access.redhat.com/security/cve/CVE-2017-9048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-9048
https://security.gentoo.org/glsa/201711-01
https://ubuntu.com/security/notices/USN-3424-1
https://ubuntu.com/security/notices/USN-3424-2
https://www.cve.org/CVERecord?id=CVE-2017-9048
|
| libxml2 |
CVE-2023-45322 |
LOW |
2.9.1-6.el7_9.6 |
|
http://www.openwall.com/lists/oss-security/2023/10/06/5
https://access.redhat.com/security/cve/CVE-2023-45322
https://gitlab.gnome.org/GNOME/libxml2/-/issues/344
https://gitlab.gnome.org/GNOME/libxml2/-/issues/583
https://nvd.nist.gov/vuln/detail/CVE-2023-45322
https://www.cve.org/CVERecord?id=CVE-2023-45322
|
| libxslt |
CVE-2015-7995 |
MEDIUM |
1.1.28-6.el7 |
|
http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html
http://lists.apple.com/archives/security-announce/2016/Jan/msg00005.html
http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html
http://lists.opensuse.org/opensuse-updates/2016-05/msg00123.html
http://www.debian.org/security/2016/dsa-3605
http://www.openwall.com/lists/oss-security/2015/10/27/10
http://www.openwall.com/lists/oss-security/2015/10/28/4
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.securityfocus.com/bid/77325
http://www.securitytracker.com/id/1034736
http://www.securitytracker.com/id/1038623
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.386546
https://access.redhat.com/security/cve/CVE-2015-7995
https://bugzilla.redhat.com/show_bug.cgi?id=1257962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995
https://git.gnome.org/browse/libxslt/commit/?id=7ca19df892ca22d9314e95d59ce2abdeff46b617
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
https://nvd.nist.gov/vuln/detail/CVE-2015-7995
https://puppet.com/security/cve/cve-2015-7995
https://support.apple.com/HT205729
https://support.apple.com/HT205731
https://support.apple.com/HT205732
https://support.apple.com/HT206168
https://ubuntu.com/security/notices/USN-3271-1
https://www.cve.org/CVERecord?id=CVE-2015-7995
|
| libxslt |
CVE-2016-1683 |
MEDIUM |
1.1.28-6.el7 |
|
http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
http://www.debian.org/security/2016/dsa-3590
http://www.debian.org/security/2016/dsa-3605
http://www.securityfocus.com/bid/90876
http://www.securityfocus.com/bid/91826
http://www.securitytracker.com/id/1035981
http://www.ubuntu.com/usn/USN-2992-1
https://access.redhat.com/errata/RHSA-2016:1190
https://access.redhat.com/security/cve/CVE-2016-1683
https://bugs.chromium.org/p/chromium/issues/detail?id=583156
https://bugzilla.redhat.com/show_bug.cgi?id=1340016
https://crbug.com/583156
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683
https://git.gnome.org/browse/libxslt/commit/?id=d182d8f6ba3071503d96ce17395c9d55871f0242
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
https://nvd.nist.gov/vuln/detail/CVE-2016-1683
https://security.gentoo.org/glsa/201607-07
https://support.apple.com/HT206899
https://support.apple.com/HT206901
https://support.apple.com/HT206902
https://support.apple.com/HT206903
https://support.apple.com/HT206904
https://support.apple.com/HT206905
https://ubuntu.com/security/notices/USN-2992-1
https://ubuntu.com/security/notices/USN-3271-1
https://www.cve.org/CVERecord?id=CVE-2016-1683
|
| libxslt |
CVE-2016-1684 |
MEDIUM |
1.1.28-6.el7 |
|
http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html
http://www.debian.org/security/2016/dsa-3590
http://www.debian.org/security/2016/dsa-3605
http://www.securityfocus.com/bid/90876
http://www.securitytracker.com/id/1035981
http://www.ubuntu.com/usn/USN-2992-1
https://access.redhat.com/errata/RHSA-2016:1190
https://access.redhat.com/security/cve/CVE-2016-1684
https://bugzilla.redhat.com/show_bug.cgi?id=1340017
https://crbug.com/583171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684
https://git.gnome.org/browse/libxslt/commit/?id=91d0540ac9beaa86719a05b749219a69baa0dd8d
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
https://nvd.nist.gov/vuln/detail/CVE-2016-1684
https://security.gentoo.org/glsa/201607-07
https://support.apple.com/HT206899
https://support.apple.com/HT206901
https://support.apple.com/HT206902
https://support.apple.com/HT206903
https://support.apple.com/HT206904
https://support.apple.com/HT206905
https://ubuntu.com/security/notices/USN-2992-1
https://ubuntu.com/security/notices/USN-3271-1
https://www.cve.org/CVERecord?id=CVE-2016-1684
|
| libxslt |
CVE-2016-1841 |
MEDIUM |
1.1.28-6.el7 |
|
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
http://www.securityfocus.com/bid/90691
http://www.securitytracker.com/id/1035890
https://access.redhat.com/security/cve/CVE-2016-1841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1841
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
https://nvd.nist.gov/vuln/detail/CVE-2016-1841
https://support.apple.com/HT206564
https://support.apple.com/HT206566
https://support.apple.com/HT206567
https://support.apple.com/HT206568
https://ubuntu.com/security/notices/USN-3271-1
https://www.cve.org/CVERecord?id=CVE-2016-1841
|
| libxslt |
CVE-2016-4607 |
MEDIUM |
1.1.28-6.el7 |
|
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
http://www.securityfocus.com/bid/91834
http://www.securitytracker.com/id/1036348
https://access.redhat.com/security/cve/CVE-2016-4607
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4607
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
https://nvd.nist.gov/vuln/detail/CVE-2016-4607
https://support.apple.com/HT206899
https://support.apple.com/HT206901
https://support.apple.com/HT206902
https://support.apple.com/HT206903
https://support.apple.com/HT206904
https://support.apple.com/HT206905
https://ubuntu.com/security/notices/USN-3271-1
https://www.cve.org/CVERecord?id=CVE-2016-4607
|
| libxslt |
CVE-2016-4608 |
MEDIUM |
1.1.28-6.el7 |
|
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
http://www.securityfocus.com/bid/91826
http://www.securitytracker.com/id/1036348
https://access.redhat.com/security/cve/CVE-2016-4608
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4608
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
https://nvd.nist.gov/vuln/detail/CVE-2016-4608
https://support.apple.com/HT206899
https://support.apple.com/HT206901
https://support.apple.com/HT206902
https://support.apple.com/HT206903
https://support.apple.com/HT206904
https://support.apple.com/HT206905
https://ubuntu.com/security/notices/USN-3271-1
https://www.cve.org/CVERecord?id=CVE-2016-4608
|
| libxslt |
CVE-2016-4609 |
MEDIUM |
1.1.28-6.el7 |
|
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
http://www.securityfocus.com/bid/91826
http://www.securitytracker.com/id/1036348
https://access.redhat.com/security/cve/CVE-2016-4609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4609
https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
https://nvd.nist.gov/vuln/detail/CVE-2016-4609
https://support.apple.com/HT206899
https://support.apple.com/HT206901
https://support.apple.com/HT206902
https://support.apple.com/HT206903
https://support.apple.com/HT206904
https://support.apple.com/HT206905
https://ubuntu.com/security/notices/USN-3271-1
https://www.cve.org/CVERecord?id=CVE-2016-4609
|
| libxslt |
CVE-2016-4610 |
MEDIUM |
1.1.28-6.el7 |
|
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html
http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html
http://www.securityfocus.com/bid/91826
http://www.securitytracker.com/id/1036348
https://access.redhat.com/security/cve/CVE-2016-4610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4610
https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
https://nvd.nist.gov/vuln/detail/CVE-2016-4610
https://support.apple.com/HT206899
https://support.apple.com/HT206901
https://support.apple.com/HT206902
https://support.apple.com/HT206903
https://support.apple.com/HT206904
https://support.apple.com/HT206905
https://ubuntu.com/security/notices/USN-3271-1
https://www.cve.org/CVERecord?id=CVE-2016-4610
|
| libxslt |
CVE-2016-4738 |
MEDIUM |
1.1.28-6.el7 |
|
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html
http://www.debian.org/security/2016/dsa-3709
http://www.securityfocus.com/bid/93054
http://www.securitytracker.com/id/1036858
https://access.redhat.com/security/cve/CVE-2016-4738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4738
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
https://nvd.nist.gov/vuln/detail/CVE-2016-4738
https://support.apple.com/HT207141
https://support.apple.com/HT207142
https://support.apple.com/HT207143
https://support.apple.com/HT207170
https://ubuntu.com/security/notices/USN-3271-1
https://www.cve.org/CVERecord?id=CVE-2016-4738
|
| libxslt |
CVE-2015-9019 |
LOW |
1.1.28-6.el7 |
|
https://access.redhat.com/security/cve/CVE-2015-9019
https://bugzilla.gnome.org/show_bug.cgi?id=758400
https://bugzilla.suse.com/show_bug.cgi?id=934119
https://nvd.nist.gov/vuln/detail/CVE-2015-9019
https://www.cve.org/CVERecord?id=CVE-2015-9019
|
| libxslt |
CVE-2019-13117 |
LOW |
1.1.28-6.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html
http://www.openwall.com/lists/oss-security/2019/11/17/2
https://access.redhat.com/security/cve/CVE-2019-13117
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13117
https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-13117.yml
https://github.com/sparklemotion/nokogiri/issues/1943
https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285
https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b
https://gitlab.gnome.org/GNOME/libxslt/commit/c5eb6cf3aba0af048596106ed839b4ae17ecbcb1
https://groups.google.com/d/msg/ruby-security-ann/-Wq4aouIA3Q/yc76ZHemBgAJ
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ
https://nvd.nist.gov/vuln/detail/CVE-2019-13117
https://oss-fuzz.com/testcase-detail/5631739747106816
https://security.netapp.com/advisory/ntap-20190806-0004
https://security.netapp.com/advisory/ntap-20190806-0004/
https://security.netapp.com/advisory/ntap-20200122-0003
https://security.netapp.com/advisory/ntap-20200122-0003/
https://ubuntu.com/security/notices/USN-4164-1
https://usn.ubuntu.com/4164-1
https://usn.ubuntu.com/4164-1/
https://www.cve.org/CVERecord?id=CVE-2019-13117
https://www.oracle.com/security-alerts/cpujan2020.html
|
| libxslt |
CVE-2019-13118 |
LOW |
1.1.28-6.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html
http://seclists.org/fulldisclosure/2019/Aug/11
http://seclists.org/fulldisclosure/2019/Aug/13
http://seclists.org/fulldisclosure/2019/Aug/14
http://seclists.org/fulldisclosure/2019/Aug/15
http://seclists.org/fulldisclosure/2019/Jul/22
http://seclists.org/fulldisclosure/2019/Jul/23
http://seclists.org/fulldisclosure/2019/Jul/24
http://seclists.org/fulldisclosure/2019/Jul/26
http://seclists.org/fulldisclosure/2019/Jul/31
http://seclists.org/fulldisclosure/2019/Jul/37
http://seclists.org/fulldisclosure/2019/Jul/38
http://www.openwall.com/lists/oss-security/2019/11/17/2
https://access.redhat.com/security/cve/CVE-2019-13118
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13118
https://github.com/sparklemotion/nokogiri/blob/f7aa3b0b29d6fe5fafe93dacd9b96b6b3d16b7ec/CHANGELOG.md?plain=1#L796
https://github.com/sparklemotion/nokogiri/commit/43a175339b47b8c604508813fc75b83f13cd173e
https://github.com/sparklemotion/nokogiri/issues/1943
https://github.com/sparklemotion/nokogiri/releases/tag/v1.10.5
https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/
https://nvd.nist.gov/vuln/detail/CVE-2019-13118
https://oss-fuzz.com/testcase-detail/5197371471822848
https://seclists.org/bugtraq/2019/Aug/21
https://seclists.org/bugtraq/2019/Aug/22
https://seclists.org/bugtraq/2019/Aug/23
https://seclists.org/bugtraq/2019/Aug/25
https://seclists.org/bugtraq/2019/Jul/35
https://seclists.org/bugtraq/2019/Jul/36
https://seclists.org/bugtraq/2019/Jul/37
https://seclists.org/bugtraq/2019/Jul/40
https://seclists.org/bugtraq/2019/Jul/41
https://seclists.org/bugtraq/2019/Jul/42
https://security.netapp.com/advisory/ntap-20190806-0004
https://security.netapp.com/advisory/ntap-20190806-0004/
https://security.netapp.com/advisory/ntap-20200122-0003
https://security.netapp.com/advisory/ntap-20200122-0003/
https://support.apple.com/kb/HT210346
https://support.apple.com/kb/HT210348
https://support.apple.com/kb/HT210351
https://support.apple.com/kb/HT210353
https://support.apple.com/kb/HT210356
https://support.apple.com/kb/HT210357
https://support.apple.com/kb/HT210358
https://ubuntu.com/security/notices/USN-4164-1
https://usn.ubuntu.com/4164-1
https://usn.ubuntu.com/4164-1/
https://www.cve.org/CVERecord?id=CVE-2019-13118
https://www.oracle.com/security-alerts/cpujan2020.html
|
| log4j |
CVE-2023-26464 |
HIGH |
1.2.17-18.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2023-26464
https://lists.apache.org/thread/wkx6grrcjkh86crr49p4blc1v1nflj3t
https://nvd.nist.gov/vuln/detail/CVE-2023-26464
https://security.netapp.com/advisory/ntap-20230505-0008
https://security.netapp.com/advisory/ntap-20230505-0008/
https://www.cve.org/CVERecord?id=CVE-2023-26464
https://www.ibm.com/support/pages/security-bulletin-vulnerability-log4j-1216jar-affect-ibm-operations-analytics-log-analysis-cve-2023-26464
|
| log4j |
CVE-2020-9488 |
LOW |
1.2.17-18.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2020-9488
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9488
https://gitbox.apache.org/repos/asf?p=logging-log4j2.git;h=6851b5083ef9610bae320bf07e1f24d2aa08851b (release-2.x)
https://gitbox.apache.org/repos/asf?p=logging-log4j2.git;h=fb91a3d71e2f3dadad6fd1beb2ab857f44fe8bbb (master)
https://issues.apache.org/jira/browse/LOG4J2-2819
https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0a2699f724156a558afd1abb6c044fb9132caa66dce861b82699722a@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05%40%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r0df3d7a5acb98c57e64ab9266aa21eeee1d9b399addb96f9cf1cbe05@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881%40%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r1fc73f0e16ec2fa249d3ad39a5194afb9cc5afb4c023dc0bab5a5881@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f%40%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r22a56beb76dd8cf18e24fda9072f1e05990f49d6439662d3782a392f@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6%40%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r2f209d271349bafd91537a558a279c08ebcff8fa3e547357d58833e6@%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04%40%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r33864a0fc171c1c4bf680645ebb6d4f8057899ab294a43e1e4fe9d04@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4%40%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/r393943de452406f0f6f4b3def9f8d3c071f96323c1f6ed1a098f7fe4@%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3%40%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r3d1d00441c55144a4013adda74b051ae7864128ebcfb6ee9721a2eb3@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98%40%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r4285398e5585a0456d3d9db021a4fce6e6fcf3ec027dfa13a450ec98@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a%40%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r45916179811a32cbaa500f972de9098e6ee80ee81c7f134fce83e03a@%3Cissues.flink.apache.org%3E
https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r48bcd06049c1779ef709564544c3d8a32ae6ee5c3b7281a606ac4463@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809%40%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b%40%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r4d5dc9f3520071338d9ebc26f9f158a43ae28a91923d176b550a807b@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f%40%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r4db540cafc5d7232c62e076051ef661d37d345015b2e59b3f81a932f@%3Cdev.hive.apache.org%3E
https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f%40%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r4ed1f49616a8603832d378cb9d13e7a8b9b27972bb46d946ccd8491f@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507%40%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r5a68258e5ab12532dc179edae3d6e87037fa3b50ab9d63a90c432507@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3%40%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r65578f3761a89bc164e8964acd5d913b9f8fd997967b195a89a97ca3@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695%40%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5%40%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7e739f2961753af95e2a3a637828fb88bfca68e5d6b0221d483a9ee5@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846%40%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8c001b9a95c0bbec06f4457721edd94935a55932e64b82cc5582b846@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c%40%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r9776e71e3c67c5d13a91c1eba0dc025b48b802eb7561cc6956d6961c@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd%40%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r9a79175c393d14d760a0ae3731b4a873230a16ef321aa9ca48a810cd@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75%40%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/ra051e07a0eea4943fa104247e69596f094951f51512d42c924e86c75@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40%40%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/ra632b329b2ae2324fabbad5da204c4ec2e171ff60348ec4ba698fd40@%3Cissues.hive.apache.org%3E
https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3%40%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3%40%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/rbc7642b9800249553f13457e46b813bea1aec99d2bc9106510e00ff3@%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a%40%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/rc2dbc4633a6eea1fcbce6831876cfa17b73759a98c65326d1896cb1a@%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701%40%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rc6b81c013618d1de1b5d6b8c1088aaf87b4bacc10c2371f15a566701@%3Cnotifications.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E
https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc%40%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd55f65c6822ff235eda435d31488cfbb9aa7055cdf47481ebee777cc@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604%40%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/rd5d58088812cf8e677d99b07f73c654014c524c94e7fedbdee047604@%3Ctorque-dev.db.apache.org%3E
https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac%40%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd8e87c4d69df335d0ba7d815b63be8bd8a6352f429765c52eb07ddac@%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987%40%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/re024d86dffa72ad800f2848d0c77ed93f0b78ee808350b477a6ed987@%3Cgitbox.hive.apache.org%3E
https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f%40%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rf1c2a81a08034c688b8f15cf58a4cfab322d00002ca46d20133bee20@%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/12/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2020-9488
https://security.netapp.com/advisory/ntap-20200504-0003
https://security.netapp.com/advisory/ntap-20200504-0003/
https://www.cve.org/CVERecord?id=CVE-2020-9488
https://www.debian.org/security/2021/dsa-5020
https://www.openwall.com/lists/oss-security/2020/04/25/1
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| lua |
CVE-2014-5461 |
MEDIUM |
5.1.4-15.el7 |
|
http://advisories.mageia.org/MGASA-2014-0414.html
http://lists.opensuse.org/opensuse-updates/2014-09/msg00030.html
http://secunia.com/advisories/59890
http://secunia.com/advisories/60869
http://secunia.com/advisories/61411
http://www.debian.org/security/2014/dsa-3015
http://www.debian.org/security/2014/dsa-3016
http://www.lua.org/bugs.html#5.2.2-1
http://www.mandriva.com/security/advisories?name=MDVSA-2015:144
http://www.openwall.com/lists/oss-security/2014/08/21/1
http://www.openwall.com/lists/oss-security/2014/08/21/4
http://www.openwall.com/lists/oss-security/2014/08/27/2
http://www.securityfocus.com/bid/69342
http://www.ubuntu.com/usn/USN-2338-1
https://access.redhat.com/security/cve/CVE-2014-5461
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5461
https://nvd.nist.gov/vuln/detail/CVE-2014-5461
https://security.gentoo.org/glsa/201701-53
https://security.gentoo.org/glsa/202305-23
https://ubuntu.com/security/notices/USN-2338-1
https://www.cve.org/CVERecord?id=CVE-2014-5461
|
| lua |
CVE-2021-43519 |
MEDIUM |
5.1.4-15.el7 |
|
http://lua-users.org/lists/lua-l/2021-10/msg00123.html
http://lua-users.org/lists/lua-l/2021-11/msg00015.html
https://access.redhat.com/errata/RHSA-2023:0957
https://access.redhat.com/security/cve/CVE-2021-43519
https://bugzilla.redhat.com/2047672
https://bugzilla.redhat.com/2064772
https://bugzilla.redhat.com/show_bug.cgi?id=2047672
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43519
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44964
https://errata.almalinux.org/9/ALSA-2023-0957.html
https://errata.rockylinux.org/RLSA-2023:0957
https://linux.oracle.com/cve/CVE-2021-43519.html
https://linux.oracle.com/errata/ELSA-2023-0957.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C7XHFYHGSZKL53VCLSJSAJ6VMFGAIXKO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P3EMGAQ5Y6GXJLY4K5DUOOEQT4MZ4J4F/
https://nvd.nist.gov/vuln/detail/CVE-2021-43519
https://www.cve.org/CVERecord?id=CVE-2021-43519
|
| lz4 |
CVE-2019-17543 |
MEDIUM |
1.8.3-1.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html
https://access.redhat.com/security/cve/CVE-2019-17543
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941
https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2
https://github.com/lz4/lz4/issues/801
https://github.com/lz4/lz4/pull/756
https://github.com/lz4/lz4/pull/760
https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17%40%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6%40%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357%40%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3%40%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316%40%3Cissues.arrow.apache.org%3E
https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3%40%3Cdev.arrow.apache.org%3E
https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26%40%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720%40%3Cissues.kudu.apache.org%3E
https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960%40%3Cissues.kudu.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-17543
https://security.netapp.com/advisory/ntap-20210723-0001/
https://www.cve.org/CVERecord?id=CVE-2019-17543
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| lz4 |
CVE-2021-3520 |
MEDIUM |
1.8.3-1.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-3520
https://bugzilla.redhat.com/show_bug.cgi?id=1954559
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520
https://errata.almalinux.org/8/ALSA-2021-2575.html
https://errata.rockylinux.org/RLSA-2021:2575
https://github.com/lz4/lz4/pull/972
https://linux.oracle.com/cve/CVE-2021-3520.html
https://linux.oracle.com/errata/ELSA-2021-2575.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3520
https://security.netapp.com/advisory/ntap-20211104-0005/
https://ubuntu.com/security/notices/USN-4968-1
https://ubuntu.com/security/notices/USN-4968-2
https://www.cve.org/CVERecord?id=CVE-2021-3520
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| mpfr |
CVE-2014-9474 |
LOW |
3.1.1-4.el7 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147737.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147745.html
http://www.mpfr.org/mpfr-3.1.2/patch11
http://www.openwall.com/lists/oss-security/2015/01/03/12
http://www.securityfocus.com/bid/71542
https://access.redhat.com/security/cve/CVE-2014-9474
https://bugzilla.redhat.com/show_bug.cgi?id=1171701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474
https://gforge.inria.fr/scm/viewvc.php/mpfr?revision=9243&view=revision
https://gforge.inria.fr/scm/viewvc.php?view=rev&root=mpfr&revision=9243
https://gmplib.org/list-archives/gmp-bugs/2013-December/003267.html
https://nvd.nist.gov/vuln/detail/CVE-2014-9474
https://security.gentoo.org/glsa/201512-06
https://www.cve.org/CVERecord?id=CVE-2014-9474
|
| ncurses |
CVE-2017-10684 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-10684
https://bugzilla.redhat.com/show_bug.cgi?id=1464687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-10684
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-10684
|
| ncurses |
CVE-2017-10685 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-10685
https://bugzilla.redhat.com/show_bug.cgi?id=1464692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685
https://nvd.nist.gov/vuln/detail/CVE-2017-10685
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-10685
|
| ncurses |
CVE-2019-17594 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://bugzilla.redhat.com/show_bug.cgi?id=1766617
https://bugzilla.redhat.com/show_bug.cgi?id=1766745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://errata.rockylinux.org/RLSA-2021:4426
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17594
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
https://ubuntu.com/security/notices/USN-6099-1
https://www.cve.org/CVERecord?id=CVE-2019-17594
|
| ncurses |
CVE-2019-17595 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://bugzilla.redhat.com/show_bug.cgi?id=1766617
https://bugzilla.redhat.com/show_bug.cgi?id=1766745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://errata.rockylinux.org/RLSA-2021:4426
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17595
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
https://ubuntu.com/security/notices/USN-6099-1
https://www.cve.org/CVERecord?id=CVE-2019-17595
|
| ncurses |
CVE-2023-29491 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
http://ncurses.scripts.mit.edu/?p=ncurses.git%3Ba=commit%3Bh=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
http://ncurses.scripts.mit.edu/?p=ncurses.git;a=commit;h=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
http://www.openwall.com/lists/oss-security/2023/04/19/10
http://www.openwall.com/lists/oss-security/2023/04/19/11
https://access.redhat.com/errata/RHSA-2023:6698
https://access.redhat.com/security/cve/CVE-2023-29491
https://bugzilla.redhat.com/2191704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29491
https://errata.almalinux.org/9/ALSA-2023-6698.html
https://invisible-island.net/ncurses/NEWS.html#index-t20230408
https://linux.oracle.com/cve/CVE-2023-29491.html
https://linux.oracle.com/errata/ELSA-2023-6698.html
https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://nvd.nist.gov/vuln/detail/CVE-2023-29491
https://security.netapp.com/advisory/ntap-20230517-0009/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6099-1
https://www.cve.org/CVERecord?id=CVE-2023-29491
https://www.openwall.com/lists/oss-security/2023/04/12/5
https://www.openwall.com/lists/oss-security/2023/04/13/4
|
| ncurses |
CVE-2017-11112 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-11112
https://bugzilla.redhat.com/show_bug.cgi?id=1464686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112
https://nvd.nist.gov/vuln/detail/CVE-2017-11112
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-11112
|
| ncurses |
CVE-2017-11113 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-11113
https://bugzilla.redhat.com/show_bug.cgi?id=1464691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113
https://nvd.nist.gov/vuln/detail/CVE-2017-11113
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-11113
|
| ncurses |
CVE-2017-13728 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13728
https://bugzilla.redhat.com/show_bug.cgi?id=1484274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13728
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13728
|
| ncurses |
CVE-2017-13729 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13729
https://bugzilla.redhat.com/show_bug.cgi?id=1484276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13729
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13729
|
| ncurses |
CVE-2017-13730 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13730
https://bugzilla.redhat.com/show_bug.cgi?id=1484284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13730
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13730
|
| ncurses |
CVE-2017-13731 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13731
https://bugzilla.redhat.com/show_bug.cgi?id=1484285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13731
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13731
|
| ncurses |
CVE-2017-13732 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13732
https://bugzilla.redhat.com/show_bug.cgi?id=1484287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13732
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13732
|
| ncurses |
CVE-2017-13733 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13733
https://bugzilla.redhat.com/show_bug.cgi?id=1484290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13733
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13733
|
| ncurses |
CVE-2017-13734 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13734
https://bugzilla.redhat.com/show_bug.cgi?id=1484291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734
https://nvd.nist.gov/vuln/detail/CVE-2017-13734
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13734
|
| ncurses |
CVE-2017-16879 |
LOW |
5.9-14.20130511.el7_4 |
|
http://invisible-island.net/ncurses/NEWS.html#t20171125
http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2017-16879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-16879
https://security.gentoo.org/glsa/201804-13
https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
https://ubuntu.com/security/notices/USN-5477-1
https://www.cve.org/CVERecord?id=CVE-2017-16879
|
| ncurses |
CVE-2018-10754 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2018-10754
https://nvd.nist.gov/vuln/detail/CVE-2018-10754
https://www.cve.org/CVERecord?id=CVE-2018-10754
|
| ncurses |
CVE-2018-19211 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19211
https://nvd.nist.gov/vuln/detail/CVE-2018-19211
https://ubuntu.com/security/notices/USN-5477-1
https://www.cve.org/CVERecord?id=CVE-2018-19211
|
| ncurses |
CVE-2018-19217 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2018-19217
https://bugzilla.redhat.com/show_bug.cgi?id=1643753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19217
https://lists.gnu.org/archive/html/bug-ncurses/2019-04/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2018-19217
https://www.cve.org/CVERecord?id=CVE-2018-19217
|
| ncurses |
CVE-2020-19185 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19185
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19185
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19185
|
| ncurses |
CVE-2020-19186 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19186
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19186
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19186
|
| ncurses |
CVE-2020-19187 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19187
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19187
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19187
|
| ncurses |
CVE-2020-19188 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19188
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19188
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19188
|
| ncurses |
CVE-2020-19189 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19189
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md
https://lists.debian.org/debian-lts-announce/2023/09/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2020-19189
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://ubuntu.com/security/notices/USN-6451-1
https://www.cve.org/CVERecord?id=CVE-2020-19189
|
| ncurses |
CVE-2020-19190 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19190
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19190
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19190
|
| ncurses |
CVE-2021-39537 |
LOW |
5.9-14.20130511.el7_4 |
|
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
http://seclists.org/fulldisclosure/2022/Oct/43
http://seclists.org/fulldisclosure/2022/Oct/45
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://security.netapp.com/advisory/ntap-20230427-0012/
https://support.apple.com/kb/HT213443
https://support.apple.com/kb/HT213444
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5477-1
https://ubuntu.com/security/notices/USN-6099-1
https://www.cve.org/CVERecord?id=CVE-2021-39537
|
| ncurses |
CVE-2023-50495 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2023-50495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50495
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2023-50495
https://security.netapp.com/advisory/ntap-20240119-0008/
https://ubuntu.com/security/notices/USN-6684-1
https://www.cve.org/CVERecord?id=CVE-2023-50495
|
| ncurses-base |
CVE-2017-10684 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-10684
https://bugzilla.redhat.com/show_bug.cgi?id=1464687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-10684
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-10684
|
| ncurses-base |
CVE-2017-10685 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-10685
https://bugzilla.redhat.com/show_bug.cgi?id=1464692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685
https://nvd.nist.gov/vuln/detail/CVE-2017-10685
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-10685
|
| ncurses-base |
CVE-2019-17594 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://bugzilla.redhat.com/show_bug.cgi?id=1766617
https://bugzilla.redhat.com/show_bug.cgi?id=1766745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://errata.rockylinux.org/RLSA-2021:4426
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17594
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
https://ubuntu.com/security/notices/USN-6099-1
https://www.cve.org/CVERecord?id=CVE-2019-17594
|
| ncurses-base |
CVE-2019-17595 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://bugzilla.redhat.com/show_bug.cgi?id=1766617
https://bugzilla.redhat.com/show_bug.cgi?id=1766745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://errata.rockylinux.org/RLSA-2021:4426
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17595
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
https://ubuntu.com/security/notices/USN-6099-1
https://www.cve.org/CVERecord?id=CVE-2019-17595
|
| ncurses-base |
CVE-2023-29491 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
http://ncurses.scripts.mit.edu/?p=ncurses.git%3Ba=commit%3Bh=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
http://ncurses.scripts.mit.edu/?p=ncurses.git;a=commit;h=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
http://www.openwall.com/lists/oss-security/2023/04/19/10
http://www.openwall.com/lists/oss-security/2023/04/19/11
https://access.redhat.com/errata/RHSA-2023:6698
https://access.redhat.com/security/cve/CVE-2023-29491
https://bugzilla.redhat.com/2191704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29491
https://errata.almalinux.org/9/ALSA-2023-6698.html
https://invisible-island.net/ncurses/NEWS.html#index-t20230408
https://linux.oracle.com/cve/CVE-2023-29491.html
https://linux.oracle.com/errata/ELSA-2023-6698.html
https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://nvd.nist.gov/vuln/detail/CVE-2023-29491
https://security.netapp.com/advisory/ntap-20230517-0009/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6099-1
https://www.cve.org/CVERecord?id=CVE-2023-29491
https://www.openwall.com/lists/oss-security/2023/04/12/5
https://www.openwall.com/lists/oss-security/2023/04/13/4
|
| ncurses-base |
CVE-2017-11112 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-11112
https://bugzilla.redhat.com/show_bug.cgi?id=1464686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112
https://nvd.nist.gov/vuln/detail/CVE-2017-11112
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-11112
|
| ncurses-base |
CVE-2017-11113 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-11113
https://bugzilla.redhat.com/show_bug.cgi?id=1464691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113
https://nvd.nist.gov/vuln/detail/CVE-2017-11113
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-11113
|
| ncurses-base |
CVE-2017-13728 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13728
https://bugzilla.redhat.com/show_bug.cgi?id=1484274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13728
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13728
|
| ncurses-base |
CVE-2017-13729 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13729
https://bugzilla.redhat.com/show_bug.cgi?id=1484276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13729
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13729
|
| ncurses-base |
CVE-2017-13730 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13730
https://bugzilla.redhat.com/show_bug.cgi?id=1484284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13730
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13730
|
| ncurses-base |
CVE-2017-13731 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13731
https://bugzilla.redhat.com/show_bug.cgi?id=1484285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13731
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13731
|
| ncurses-base |
CVE-2017-13732 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13732
https://bugzilla.redhat.com/show_bug.cgi?id=1484287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13732
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13732
|
| ncurses-base |
CVE-2017-13733 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13733
https://bugzilla.redhat.com/show_bug.cgi?id=1484290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13733
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13733
|
| ncurses-base |
CVE-2017-13734 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13734
https://bugzilla.redhat.com/show_bug.cgi?id=1484291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734
https://nvd.nist.gov/vuln/detail/CVE-2017-13734
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13734
|
| ncurses-base |
CVE-2017-16879 |
LOW |
5.9-14.20130511.el7_4 |
|
http://invisible-island.net/ncurses/NEWS.html#t20171125
http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2017-16879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-16879
https://security.gentoo.org/glsa/201804-13
https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
https://ubuntu.com/security/notices/USN-5477-1
https://www.cve.org/CVERecord?id=CVE-2017-16879
|
| ncurses-base |
CVE-2018-10754 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2018-10754
https://nvd.nist.gov/vuln/detail/CVE-2018-10754
https://www.cve.org/CVERecord?id=CVE-2018-10754
|
| ncurses-base |
CVE-2018-19211 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19211
https://nvd.nist.gov/vuln/detail/CVE-2018-19211
https://ubuntu.com/security/notices/USN-5477-1
https://www.cve.org/CVERecord?id=CVE-2018-19211
|
| ncurses-base |
CVE-2018-19217 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2018-19217
https://bugzilla.redhat.com/show_bug.cgi?id=1643753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19217
https://lists.gnu.org/archive/html/bug-ncurses/2019-04/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2018-19217
https://www.cve.org/CVERecord?id=CVE-2018-19217
|
| ncurses-base |
CVE-2020-19185 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19185
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19185
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19185
|
| ncurses-base |
CVE-2020-19186 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19186
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19186
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19186
|
| ncurses-base |
CVE-2020-19187 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19187
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19187
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19187
|
| ncurses-base |
CVE-2020-19188 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19188
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19188
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19188
|
| ncurses-base |
CVE-2020-19189 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19189
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md
https://lists.debian.org/debian-lts-announce/2023/09/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2020-19189
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://ubuntu.com/security/notices/USN-6451-1
https://www.cve.org/CVERecord?id=CVE-2020-19189
|
| ncurses-base |
CVE-2020-19190 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19190
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19190
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19190
|
| ncurses-base |
CVE-2021-39537 |
LOW |
5.9-14.20130511.el7_4 |
|
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
http://seclists.org/fulldisclosure/2022/Oct/43
http://seclists.org/fulldisclosure/2022/Oct/45
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://security.netapp.com/advisory/ntap-20230427-0012/
https://support.apple.com/kb/HT213443
https://support.apple.com/kb/HT213444
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5477-1
https://ubuntu.com/security/notices/USN-6099-1
https://www.cve.org/CVERecord?id=CVE-2021-39537
|
| ncurses-base |
CVE-2023-50495 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2023-50495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50495
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2023-50495
https://security.netapp.com/advisory/ntap-20240119-0008/
https://ubuntu.com/security/notices/USN-6684-1
https://www.cve.org/CVERecord?id=CVE-2023-50495
|
| ncurses-libs |
CVE-2017-10684 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-10684
https://bugzilla.redhat.com/show_bug.cgi?id=1464687
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-10684
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-10684
|
| ncurses-libs |
CVE-2017-10685 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-10685
https://bugzilla.redhat.com/show_bug.cgi?id=1464692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685
https://nvd.nist.gov/vuln/detail/CVE-2017-10685
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-10685
|
| ncurses-libs |
CVE-2019-17594 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17594
https://bugzilla.redhat.com/show_bug.cgi?id=1766617
https://bugzilla.redhat.com/show_bug.cgi?id=1766745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://errata.rockylinux.org/RLSA-2021:4426
https://linux.oracle.com/cve/CVE-2019-17594.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17594
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
https://ubuntu.com/security/notices/USN-6099-1
https://www.cve.org/CVERecord?id=CVE-2019-17594
|
| ncurses-libs |
CVE-2019-17595 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html
https://access.redhat.com/security/cve/CVE-2019-17595
https://bugzilla.redhat.com/show_bug.cgi?id=1766617
https://bugzilla.redhat.com/show_bug.cgi?id=1766745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595
https://errata.almalinux.org/8/ALSA-2021-4426.html
https://errata.rockylinux.org/RLSA-2021:4426
https://linux.oracle.com/cve/CVE-2019-17595.html
https://linux.oracle.com/errata/ELSA-2021-4426.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html
https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17595
https://security.gentoo.org/glsa/202101-28
https://ubuntu.com/security/notices/USN-5477-1
https://ubuntu.com/security/notices/USN-6099-1
https://www.cve.org/CVERecord?id=CVE-2019-17595
|
| ncurses-libs |
CVE-2023-29491 |
MEDIUM |
5.9-14.20130511.el7_4 |
|
http://ncurses.scripts.mit.edu/?p=ncurses.git%3Ba=commit%3Bh=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
http://ncurses.scripts.mit.edu/?p=ncurses.git;a=commit;h=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
http://www.openwall.com/lists/oss-security/2023/04/19/10
http://www.openwall.com/lists/oss-security/2023/04/19/11
https://access.redhat.com/errata/RHSA-2023:6698
https://access.redhat.com/security/cve/CVE-2023-29491
https://bugzilla.redhat.com/2191704
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29491
https://errata.almalinux.org/9/ALSA-2023-6698.html
https://invisible-island.net/ncurses/NEWS.html#index-t20230408
https://linux.oracle.com/cve/CVE-2023-29491.html
https://linux.oracle.com/errata/ELSA-2023-6698.html
https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://nvd.nist.gov/vuln/detail/CVE-2023-29491
https://security.netapp.com/advisory/ntap-20230517-0009/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6099-1
https://www.cve.org/CVERecord?id=CVE-2023-29491
https://www.openwall.com/lists/oss-security/2023/04/12/5
https://www.openwall.com/lists/oss-security/2023/04/13/4
|
| ncurses-libs |
CVE-2017-11112 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-11112
https://bugzilla.redhat.com/show_bug.cgi?id=1464686
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112
https://nvd.nist.gov/vuln/detail/CVE-2017-11112
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-11112
|
| ncurses-libs |
CVE-2017-11113 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-11113
https://bugzilla.redhat.com/show_bug.cgi?id=1464691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113
https://nvd.nist.gov/vuln/detail/CVE-2017-11113
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-11113
|
| ncurses-libs |
CVE-2017-13728 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13728
https://bugzilla.redhat.com/show_bug.cgi?id=1484274
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13728
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13728
|
| ncurses-libs |
CVE-2017-13729 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13729
https://bugzilla.redhat.com/show_bug.cgi?id=1484276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13729
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13729
|
| ncurses-libs |
CVE-2017-13730 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13730
https://bugzilla.redhat.com/show_bug.cgi?id=1484284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13730
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13730
|
| ncurses-libs |
CVE-2017-13731 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13731
https://bugzilla.redhat.com/show_bug.cgi?id=1484285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13731
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13731
|
| ncurses-libs |
CVE-2017-13732 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13732
https://bugzilla.redhat.com/show_bug.cgi?id=1484287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13732
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13732
|
| ncurses-libs |
CVE-2017-13733 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13733
https://bugzilla.redhat.com/show_bug.cgi?id=1484290
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-13733
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13733
|
| ncurses-libs |
CVE-2017-13734 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2017-13734
https://bugzilla.redhat.com/show_bug.cgi?id=1484291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734
https://nvd.nist.gov/vuln/detail/CVE-2017-13734
https://security.gentoo.org/glsa/201804-13
https://ubuntu.com/security/notices/USN-5448-1
https://www.cve.org/CVERecord?id=CVE-2017-13734
|
| ncurses-libs |
CVE-2017-16879 |
LOW |
5.9-14.20130511.el7_4 |
|
http://invisible-island.net/ncurses/NEWS.html#t20171125
http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2017-16879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-16879
https://security.gentoo.org/glsa/201804-13
https://tools.cisco.com/security/center/viewAlert.x?alertId=57695
https://ubuntu.com/security/notices/USN-5477-1
https://www.cve.org/CVERecord?id=CVE-2017-16879
|
| ncurses-libs |
CVE-2018-10754 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2018-10754
https://nvd.nist.gov/vuln/detail/CVE-2018-10754
https://www.cve.org/CVERecord?id=CVE-2018-10754
|
| ncurses-libs |
CVE-2018-19211 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2018-19211
https://bugzilla.redhat.com/show_bug.cgi?id=1643754
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19211
https://nvd.nist.gov/vuln/detail/CVE-2018-19211
https://ubuntu.com/security/notices/USN-5477-1
https://www.cve.org/CVERecord?id=CVE-2018-19211
|
| ncurses-libs |
CVE-2018-19217 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2018-19217
https://bugzilla.redhat.com/show_bug.cgi?id=1643753
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19217
https://lists.gnu.org/archive/html/bug-ncurses/2019-04/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2018-19217
https://www.cve.org/CVERecord?id=CVE-2018-19217
|
| ncurses-libs |
CVE-2020-19185 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19185
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19185
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19185
|
| ncurses-libs |
CVE-2020-19186 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19186
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19186
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19186
|
| ncurses-libs |
CVE-2020-19187 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19187
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19187
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19187
|
| ncurses-libs |
CVE-2020-19188 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19188
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19188
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19188
|
| ncurses-libs |
CVE-2020-19189 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19189
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md
https://lists.debian.org/debian-lts-announce/2023/09/msg00033.html
https://nvd.nist.gov/vuln/detail/CVE-2020-19189
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://ubuntu.com/security/notices/USN-6451-1
https://www.cve.org/CVERecord?id=CVE-2020-19189
|
| ncurses-libs |
CVE-2020-19190 |
LOW |
5.9-14.20130511.el7_4 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2020-19190
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md
https://nvd.nist.gov/vuln/detail/CVE-2020-19190
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://www.cve.org/CVERecord?id=CVE-2020-19190
|
| ncurses-libs |
CVE-2021-39537 |
LOW |
5.9-14.20130511.el7_4 |
|
http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
http://seclists.org/fulldisclosure/2022/Oct/43
http://seclists.org/fulldisclosure/2022/Oct/45
https://access.redhat.com/security/cve/CVE-2021-39537
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537
https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html
https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html
https://nvd.nist.gov/vuln/detail/CVE-2021-39537
https://security.netapp.com/advisory/ntap-20230427-0012/
https://support.apple.com/kb/HT213443
https://support.apple.com/kb/HT213444
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5477-1
https://ubuntu.com/security/notices/USN-6099-1
https://www.cve.org/CVERecord?id=CVE-2021-39537
|
| ncurses-libs |
CVE-2023-50495 |
LOW |
5.9-14.20130511.el7_4 |
|
https://access.redhat.com/security/cve/CVE-2023-50495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50495
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2023-50495
https://security.netapp.com/advisory/ntap-20240119-0008/
https://ubuntu.com/security/notices/USN-6684-1
https://www.cve.org/CVERecord?id=CVE-2023-50495
|
| nettle |
CVE-2018-16869 |
MEDIUM |
2.7.1-9.el7_9 |
|
http://cat.eyalro.net/
http://www.securityfocus.com/bid/106092
https://access.redhat.com/security/cve/CVE-2018-16869
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869
https://lists.debian.org/debian-lts/2019/03/msg00021.html
https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html
https://nvd.nist.gov/vuln/detail/CVE-2018-16869
https://ubuntu.com/security/notices/USN-4990-1
https://www.cve.org/CVERecord?id=CVE-2018-16869
|
| nettle |
CVE-2021-3580 |
MEDIUM |
2.7.1-9.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-3580
https://bugzilla.redhat.com/show_bug.cgi?id=1776250
https://bugzilla.redhat.com/show_bug.cgi?id=1908110
https://bugzilla.redhat.com/show_bug.cgi?id=1908334
https://bugzilla.redhat.com/show_bug.cgi?id=1922275
https://bugzilla.redhat.com/show_bug.cgi?id=1922276
https://bugzilla.redhat.com/show_bug.cgi?id=1965445
https://bugzilla.redhat.com/show_bug.cgi?id=1967983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
https://errata.almalinux.org/8/ALSA-2021-4451.html
https://errata.rockylinux.org/RLSA-2021:4451
https://linux.oracle.com/cve/CVE-2021-3580.html
https://linux.oracle.com/errata/ELSA-2022-9221.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3580
https://security.gentoo.org/glsa/202401-24
https://security.netapp.com/advisory/ntap-20211104-0006/
https://ubuntu.com/security/notices/USN-4990-1
https://www.cve.org/CVERecord?id=CVE-2021-3580
|
| nettle-devel |
CVE-2018-16869 |
MEDIUM |
2.7.1-9.el7_9 |
|
http://cat.eyalro.net/
http://www.securityfocus.com/bid/106092
https://access.redhat.com/security/cve/CVE-2018-16869
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16869
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869
https://lists.debian.org/debian-lts/2019/03/msg00021.html
https://lists.lysator.liu.se/pipermail/nettle-bugs/2018/007363.html
https://nvd.nist.gov/vuln/detail/CVE-2018-16869
https://ubuntu.com/security/notices/USN-4990-1
https://www.cve.org/CVERecord?id=CVE-2018-16869
|
| nettle-devel |
CVE-2021-3580 |
MEDIUM |
2.7.1-9.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-3580
https://bugzilla.redhat.com/show_bug.cgi?id=1776250
https://bugzilla.redhat.com/show_bug.cgi?id=1908110
https://bugzilla.redhat.com/show_bug.cgi?id=1908334
https://bugzilla.redhat.com/show_bug.cgi?id=1922275
https://bugzilla.redhat.com/show_bug.cgi?id=1922276
https://bugzilla.redhat.com/show_bug.cgi?id=1965445
https://bugzilla.redhat.com/show_bug.cgi?id=1967983
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580
https://errata.almalinux.org/8/ALSA-2021-4451.html
https://errata.rockylinux.org/RLSA-2021:4451
https://linux.oracle.com/cve/CVE-2021-3580.html
https://linux.oracle.com/errata/ELSA-2022-9221.html
https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3580
https://security.gentoo.org/glsa/202401-24
https://security.netapp.com/advisory/ntap-20211104-0006/
https://ubuntu.com/security/notices/USN-4990-1
https://www.cve.org/CVERecord?id=CVE-2021-3580
|
| nspr |
CVE-2016-1951 |
MEDIUM |
4.35.0-1.el7_9 |
|
http://www.securityfocus.com/bid/92385
http://www.securitytracker.com/id/1036590
http://www.ubuntu.com/usn/USN-3023-1
https://access.redhat.com/security/cve/CVE-2016-1951
https://bugzilla.mozilla.org/show_bug.cgi?id=1174015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1951
https://groups.google.com/forum/#!topic/mozilla.dev.tech.nspr/dV4MyMsg6jw
https://groups.google.com/forum/message/raw?msg=mozilla.dev.tech.nspr/dV4MyMsg6jw/hhWcXOgJDQAJ
https://hg.mozilla.org/projects/nspr/rev/96381e3aaae2
https://nvd.nist.gov/vuln/detail/CVE-2016-1951
https://ubuntu.com/security/notices/USN-3023-1
https://ubuntu.com/security/notices/USN-3028-1
https://www.cve.org/CVERecord?id=CVE-2016-1951
|
| nss |
CVE-2014-3566 |
HIGH |
3.90.0-2.el7_9 |
|
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
http://advisories.mageia.org/MGASA-2014-0416.html
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
http://askubuntu.com/a/537196
http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
http://downloads.asterisk.org/pub/security/AST-2014-011.html
http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
http://marc.info/?l=bugtraq&m=141450452204552&w=2
http://marc.info/?l=bugtraq&m=141450973807288&w=2
http://marc.info/?l=bugtraq&m=141477196830952&w=2
http://marc.info/?l=bugtraq&m=141576815022399&w=2
http://marc.info/?l=bugtraq&m=141577087123040&w=2
http://marc.info/?l=bugtraq&m=141577350823734&w=2
http://marc.info/?l=bugtraq&m=141620103726640&w=2
http://marc.info/?l=bugtraq&m=141628688425177&w=2
http://marc.info/?l=bugtraq&m=141694355519663&w=2
http://marc.info/?l=bugtraq&m=141697638231025&w=2
http://marc.info/?l=bugtraq&m=141697676231104&w=2
http://marc.info/?l=bugtraq&m=141703183219781&w=2
http://marc.info/?l=bugtraq&m=141715130023061&w=2
http://marc.info/?l=bugtraq&m=141775427104070&w=2
http://marc.info/?l=bugtraq&m=141813976718456&w=2
http://marc.info/?l=bugtraq&m=141814011518700&w=2
http://marc.info/?l=bugtraq&m=141879378918327&w=2
http://marc.info/?l=bugtraq&m=142103967620673&w=2
http://marc.info/?l=bugtraq&m=142118135300698&w=2
http://marc.info/?l=bugtraq&m=142296755107581&w=2
http://marc.info/?l=bugtraq&m=142350196615714&w=2
http://marc.info/?l=bugtraq&m=142350298616097&w=2
http://marc.info/?l=bugtraq&m=142350743917559&w=2
http://marc.info/?l=bugtraq&m=142354438527235&w=2
http://marc.info/?l=bugtraq&m=142357976805598&w=2
http://marc.info/?l=bugtraq&m=142495837901899&w=2
http://marc.info/?l=bugtraq&m=142496355704097&w=2
http://marc.info/?l=bugtraq&m=142546741516006&w=2
http://marc.info/?l=bugtraq&m=142607790919348&w=2
http://marc.info/?l=bugtraq&m=142624590206005&w=2
http://marc.info/?l=bugtraq&m=142624619906067
http://marc.info/?l=bugtraq&m=142624619906067&w=2
http://marc.info/?l=bugtraq&m=142624679706236&w=2
http://marc.info/?l=bugtraq&m=142624719706349&w=2
http://marc.info/?l=bugtraq&m=142660345230545&w=2
http://marc.info/?l=bugtraq&m=142721830231196&w=2
http://marc.info/?l=bugtraq&m=142721887231400&w=2
http://marc.info/?l=bugtraq&m=142740155824959&w=2
http://marc.info/?l=bugtraq&m=142791032306609&w=2
http://marc.info/?l=bugtraq&m=142804214608580&w=2
http://marc.info/?l=bugtraq&m=142805027510172&w=2
http://marc.info/?l=bugtraq&m=142962817202793&w=2
http://marc.info/?l=bugtraq&m=143039249603103&w=2
http://marc.info/?l=bugtraq&m=143101048219218&w=2
http://marc.info/?l=bugtraq&m=143290371927178&w=2
http://marc.info/?l=bugtraq&m=143290437727362&w=2
http://marc.info/?l=bugtraq&m=143290522027658&w=2
http://marc.info/?l=bugtraq&m=143290583027876&w=2
http://marc.info/?l=bugtraq&m=143558137709884&w=2
http://marc.info/?l=bugtraq&m=143558192010071&w=2
http://marc.info/?l=bugtraq&m=143628269912142&w=2
http://marc.info/?l=bugtraq&m=144101915224472&w=2
http://marc.info/?l=bugtraq&m=144251162130364&w=2
http://marc.info/?l=bugtraq&m=144294141001552&w=2
http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=openssl-dev&m=141333049205629&w=2
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
http://rhn.redhat.com/errata/RHSA-2014-1652.html
http://rhn.redhat.com/errata/RHSA-2014-1653.html
http://rhn.redhat.com/errata/RHSA-2014-1692.html
http://rhn.redhat.com/errata/RHSA-2014-1876.html
http://rhn.redhat.com/errata/RHSA-2014-1877.html
http://rhn.redhat.com/errata/RHSA-2014-1880.html
http://rhn.redhat.com/errata/RHSA-2014-1881.html
http://rhn.redhat.com/errata/RHSA-2014-1882.html
http://rhn.redhat.com/errata/RHSA-2014-1920.html
http://rhn.redhat.com/errata/RHSA-2014-1948.html
http://rhn.redhat.com/errata/RHSA-2015-0068.html
http://rhn.redhat.com/errata/RHSA-2015-0079.html
http://rhn.redhat.com/errata/RHSA-2015-0080.html
http://rhn.redhat.com/errata/RHSA-2015-0085.html
http://rhn.redhat.com/errata/RHSA-2015-0086.html
http://rhn.redhat.com/errata/RHSA-2015-0264.html
http://rhn.redhat.com/errata/RHSA-2015-0698.html
http://rhn.redhat.com/errata/RHSA-2015-1545.html
http://rhn.redhat.com/errata/RHSA-2015-1546.html
http://secunia.com/advisories/59627
http://secunia.com/advisories/60056
http://secunia.com/advisories/60206
http://secunia.com/advisories/60792
http://secunia.com/advisories/60859
http://secunia.com/advisories/61019
http://secunia.com/advisories/61130
http://secunia.com/advisories/61303
http://secunia.com/advisories/61316
http://secunia.com/advisories/61345
http://secunia.com/advisories/61359
http://secunia.com/advisories/61782
http://secunia.com/advisories/61810
http://secunia.com/advisories/61819
http://secunia.com/advisories/61825
http://secunia.com/advisories/61827
http://secunia.com/advisories/61926
http://secunia.com/advisories/61995
http://support.apple.com/HT204244
http://support.citrix.com/article/CTX200238
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
http://www-01.ibm.com/support/docview.wss?uid=swg21687172
http://www-01.ibm.com/support/docview.wss?uid=swg21687611
http://www-01.ibm.com/support/docview.wss?uid=swg21688283
http://www-01.ibm.com/support/docview.wss?uid=swg21692299
http://www.debian.org/security/2014/dsa-3053
http://www.debian.org/security/2015/dsa-3144
http://www.debian.org/security/2015/dsa-3147
http://www.debian.org/security/2015/dsa-3253
http://www.debian.org/security/2016/dsa-3489
http://www.kb.cert.org/vuls/id/577193
http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/archive/1/533724/100/0/threaded
http://www.securityfocus.com/archive/1/533746
http://www.securityfocus.com/archive/1/533747
http://www.securityfocus.com/bid/70574
http://www.securitytracker.com/id/1031029
http://www.securitytracker.com/id/1031039
http://www.securitytracker.com/id/1031085
http://www.securitytracker.com/id/1031086
http://www.securitytracker.com/id/1031087
http://www.securitytracker.com/id/1031088
http://www.securitytracker.com/id/1031089
http://www.securitytracker.com/id/1031090
http://www.securitytracker.com/id/1031091
http://www.securitytracker.com/id/1031092
http://www.securitytracker.com/id/1031093
http://www.securitytracker.com/id/1031094
http://www.securitytracker.com/id/1031095
http://www.securitytracker.com/id/1031096
http://www.securitytracker.com/id/1031105
http://www.securitytracker.com/id/1031106
http://www.securitytracker.com/id/1031107
http://www.securitytracker.com/id/1031120
http://www.securitytracker.com/id/1031123
http://www.securitytracker.com/id/1031124
http://www.securitytracker.com/id/1031130
http://www.securitytracker.com/id/1031131
http://www.securitytracker.com/id/1031132
http://www.ubuntu.com/usn/USN-2486-1
http://www.ubuntu.com/usn/USN-2487-1
http://www.us-cert.gov/ncas/alerts/TA14-290A
http://www.vmware.com/security/advisories/VMSA-2015-0003.html
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
https://access.redhat.com/articles/1232123
https://access.redhat.com/security/cve/CVE-2014-3566
https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
https://bto.bluecoat.com/security-advisory/sa83
https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
https://bugzilla.redhat.com/show_bug.cgi?id=1152789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
https://github.com/mpgn/poodle-PoC
https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kc.mcafee.com/corporate/index?page=content&id=SB10090
https://kc.mcafee.com/corporate/index?page=content&id=SB10091
https://kc.mcafee.com/corporate/index?page=content&id=SB10104
https://linux.oracle.com/cve/CVE-2014-3566.html
https://linux.oracle.com/errata/ELSA-2015-0085.html
https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-3566
https://puppet.com/security/cve/poodle-sslv3-vulnerability
https://security.gentoo.org/glsa/201507-14
https://security.gentoo.org/glsa/201606-11
https://security.netapp.com/advisory/ntap-20141015-0001/
https://support.apple.com/HT205217
https://support.apple.com/kb/HT6527
https://support.apple.com/kb/HT6529
https://support.apple.com/kb/HT6531
https://support.apple.com/kb/HT6535
https://support.apple.com/kb/HT6536
https://support.apple.com/kb/HT6541
https://support.apple.com/kb/HT6542
https://support.citrix.com/article/CTX216642
https://support.lenovo.com/product_security/poodle
https://support.lenovo.com/us/en/product_security/poodle
https://technet.microsoft.com/library/security/3009008.aspx
https://ubuntu.com/security/notices/USN-2486-1
https://ubuntu.com/security/notices/USN-2487-1
https://www-01.ibm.com/support/docview.wss?uid=swg21688165
https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
https://www.cve.org/CVERecord?id=CVE-2014-3566
https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
https://www.elastic.co/blog/logstash-1-4-3-released
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/news/secadv_20141015.txt
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://www.suse.com/support/kb/doc.php?id=7015773
|
| nss |
CVE-2015-2808 |
MEDIUM |
3.90.0-2.el7_9 |
|
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://nvd.nist.gov/vuln/detail/CVE-2015-2808
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
https://www.cve.org/CVERecord?id=CVE-2015-2808
https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
|
| nss |
CVE-2016-2183 |
MEDIUM |
3.90.0-2.el7_9 |
|
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://rhn.redhat.com/errata/RHSA-2017-0462.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/fulldisclosure/2017/May/105
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/542005/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
http://www.securityfocus.com/bid/92630
http://www.securityfocus.com/bid/95568
http://www.securitytracker.com/id/1036696
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3179-1
http://www.ubuntu.com/usn/USN-3194-1
http://www.ubuntu.com/usn/USN-3198-1
http://www.ubuntu.com/usn/USN-3270-1
http://www.ubuntu.com/usn/USN-3372-1
https://access.redhat.com/articles/2548661
https://access.redhat.com/errata/RHSA-2016:1940
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2018:2123
https://access.redhat.com/errata/RHSA-2019:1245
https://access.redhat.com/errata/RHSA-2019:2859
https://access.redhat.com/errata/RHSA-2020:0451
https://access.redhat.com/security/cve/CVE-2016-2183
https://access.redhat.com/security/cve/cve-2016-2183
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
https://bto.bluecoat.com/security-advisory/sa133
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
https://community.qualys.com/thread/16555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
https://linux.oracle.com/cve/CVE-2016-2183.html
https://linux.oracle.com/errata/ELSA-2018-2123.html
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://nvd.nist.gov/vuln/detail/CVE-2016-2183
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
https://seclists.org/bugtraq/2018/Nov/21
https://security-tracker.debian.org/tracker/CVE-2016-2183
https://security.gentoo.org/glsa/201612-16
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20160915-0001/
https://security.netapp.com/advisory/ntap-20170119-0001/
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
https://support.f5.com/csp/article/K13167034
https://sweet32.info/
https://twitter.com/symantec/status/768786631159603200
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://ubuntu.com/security/notices/USN-3270-1
https://ubuntu.com/security/notices/USN-3372-1
https://wiki.opendaylight.org/view/Security_Advisories
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.cve.org/CVERecord?id=CVE-2016-2183
https://www.exploit-db.com/exploits/42091/
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
https://www.tenable.com/security/tns-2017-09
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
|
| nss |
CVE-2016-9074 |
MEDIUM |
3.90.0-2.el7_9 |
|
http://www.securityfocus.com/bid/94341
http://www.securitytracker.com/id/1037298
https://access.redhat.com/security/cve/CVE-2016-9074
https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
https://nvd.nist.gov/vuln/detail/CVE-2016-9074
https://security.gentoo.org/glsa/201701-15
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-3163-1
https://www.cve.org/CVERecord?id=CVE-2016-9074
https://www.debian.org/security/2016/dsa-3730
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074
https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-89/
https://www.mozilla.org/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-93/
|
| nss |
CVE-2016-9574 |
MEDIUM |
3.90.0-2.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2016-9574
https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
https://nvd.nist.gov/vuln/detail/CVE-2016-9574
https://www.cve.org/CVERecord?id=CVE-2016-9574
|
| nss |
CVE-2018-18508 |
MEDIUM |
3.90.0-2.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2018-18508
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.42.1_release_notes
https://linux.oracle.com/cve/CVE-2018-18508.html
https://linux.oracle.com/errata/ELSA-2019-1951.html
https://nvd.nist.gov/vuln/detail/CVE-2018-18508
https://ubuntu.com/security/notices/USN-3898-1
https://ubuntu.com/security/notices/USN-3898-2
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://www.cve.org/CVERecord?id=CVE-2018-18508
|
| nss |
CVE-2023-5388 |
MEDIUM |
3.90.0-2.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0108
https://access.redhat.com/security/cve/CVE-2023-5388
https://bugzilla.redhat.com/2243644
https://bugzilla.redhat.com/show_bug.cgi?id=2243644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
https://errata.almalinux.org/9/ALSA-2024-0108.html
https://errata.rockylinux.org/RLSA-2024:0105
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90_2.html
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html
https://linux.oracle.com/cve/CVE-2023-5388.html
https://linux.oracle.com/errata/ELSA-2024-0108.html
https://nvd.nist.gov/vuln/detail/CVE-2023-5388
https://people.redhat.com/~hkario/marvin/
https://www.cve.org/CVERecord?id=CVE-2023-5388
|
| nss |
CVE-2023-6135 |
MEDIUM |
3.90.0-2.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0790
https://access.redhat.com/security/cve/CVE-2023-6135
https://bugzilla.mozilla.org/show_bug.cgi?id=1853908
https://bugzilla.redhat.com/2249906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135
https://errata.almalinux.org/9/ALSA-2024-0790.html
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html
https://linux.oracle.com/cve/CVE-2023-6135.html
https://linux.oracle.com/errata/ELSA-2024-0790.html
https://minerva.crocs.fi.muni.cz/
https://nvd.nist.gov/vuln/detail/CVE-2023-6135
https://people.redhat.com/~hkario/marvin/
https://security.gentoo.org/glsa/202401-10
https://ubuntu.com/security/notices/USN-6562-1
https://www.cve.org/CVERecord?id=CVE-2023-6135
https://www.mozilla.org/en-US/security/advisories/mfsa2023-56/#CVE-2023-6135
https://www.mozilla.org/security/advisories/mfsa2023-56/
|
| nss |
CVE-2020-12413 |
LOW |
3.90.0-2.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-12413
https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2020-12413
https://nvd.nist.gov/vuln/detail/CVE-2020-12413
https://raccoon-attack.com/
https://raccoon-attack.com/RacoonAttack.pdf
https://www.cve.org/CVERecord?id=CVE-2020-12413
|
| nss-softokn |
CVE-2015-2613 |
MEDIUM |
3.90.0-6.el7_9 |
|
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1485.html
http://rhn.redhat.com/errata/RHSA-2015-1488.html
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA
http://www.securityfocus.com/bid/75871
http://www.securitytracker.com/id/1032910
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
https://access.redhat.com/security/cve/CVE-2015-2613
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
https://kc.mcafee.com/corporate/index?page=content&id=SB10139
https://nvd.nist.gov/vuln/detail/CVE-2015-2613
https://security.gentoo.org/glsa/201603-11
https://security.gentoo.org/glsa/201603-14
https://ubuntu.com/security/notices/USN-2696-1
https://www.cve.org/CVERecord?id=CVE-2015-2613
|
| nss-softokn |
CVE-2017-7781 |
MEDIUM |
3.90.0-6.el7_9 |
|
http://www.securityfocus.com/bid/100383
http://www.securitytracker.com/id/1039124
https://access.redhat.com/security/cve/CVE-2017-7781
https://bugzilla.mozilla.org/show_bug.cgi?id=1352039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7781
https://nvd.nist.gov/vuln/detail/CVE-2017-7781
https://ubuntu.com/security/notices/USN-3391-1
https://www.cve.org/CVERecord?id=CVE-2017-7781
https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/#CVE-2017-7781
https://www.mozilla.org/security/advisories/mfsa2017-18/
|
| nss-softokn |
CVE-2016-1938 |
LOW |
3.90.0-6.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
http://www.debian.org/security/2016/dsa-3688
http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.securityfocus.com/bid/81955
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1034825
http://www.ubuntu.com/usn/USN-2880-1
http://www.ubuntu.com/usn/USN-2880-2
http://www.ubuntu.com/usn/USN-2903-1
http://www.ubuntu.com/usn/USN-2903-2
http://www.ubuntu.com/usn/USN-2973-1
https://access.redhat.com/security/cve/CVE-2016-1938
https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
https://nvd.nist.gov/vuln/detail/CVE-2016-1938
https://security.gentoo.org/glsa/201605-06
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-2880-1
https://ubuntu.com/security/notices/USN-2903-1
https://ubuntu.com/security/notices/USN-2973-1
https://www.cve.org/CVERecord?id=CVE-2016-1938
https://www.mozilla.org/en-US/security/advisories/mfsa2016-07/
|
| nss-softokn-freebl |
CVE-2015-2613 |
MEDIUM |
3.90.0-6.el7_9 |
|
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1485.html
http://rhn.redhat.com/errata/RHSA-2015-1488.html
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA
http://www.securityfocus.com/bid/75871
http://www.securitytracker.com/id/1032910
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
https://access.redhat.com/security/cve/CVE-2015-2613
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613
https://kc.mcafee.com/corporate/index?page=content&id=SB10139
https://nvd.nist.gov/vuln/detail/CVE-2015-2613
https://security.gentoo.org/glsa/201603-11
https://security.gentoo.org/glsa/201603-14
https://ubuntu.com/security/notices/USN-2696-1
https://www.cve.org/CVERecord?id=CVE-2015-2613
|
| nss-softokn-freebl |
CVE-2017-7781 |
MEDIUM |
3.90.0-6.el7_9 |
|
http://www.securityfocus.com/bid/100383
http://www.securitytracker.com/id/1039124
https://access.redhat.com/security/cve/CVE-2017-7781
https://bugzilla.mozilla.org/show_bug.cgi?id=1352039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7781
https://nvd.nist.gov/vuln/detail/CVE-2017-7781
https://ubuntu.com/security/notices/USN-3391-1
https://www.cve.org/CVERecord?id=CVE-2017-7781
https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/#CVE-2017-7781
https://www.mozilla.org/security/advisories/mfsa2017-18/
|
| nss-softokn-freebl |
CVE-2016-1938 |
LOW |
3.90.0-6.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html
http://www.debian.org/security/2016/dsa-3688
http://www.mozilla.org/security/announce/2016/mfsa2016-07.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.securityfocus.com/bid/81955
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1034825
http://www.ubuntu.com/usn/USN-2880-1
http://www.ubuntu.com/usn/USN-2880-2
http://www.ubuntu.com/usn/USN-2903-1
http://www.ubuntu.com/usn/USN-2903-2
http://www.ubuntu.com/usn/USN-2973-1
https://access.redhat.com/security/cve/CVE-2016-1938
https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1190248
https://bugzilla.mozilla.org/show_bug.cgi?id=1194947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c
https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c
https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c
https://nvd.nist.gov/vuln/detail/CVE-2016-1938
https://security.gentoo.org/glsa/201605-06
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-2880-1
https://ubuntu.com/security/notices/USN-2903-1
https://ubuntu.com/security/notices/USN-2973-1
https://www.cve.org/CVERecord?id=CVE-2016-1938
https://www.mozilla.org/en-US/security/advisories/mfsa2016-07/
|
| nss-sysinit |
CVE-2014-3566 |
HIGH |
3.90.0-2.el7_9 |
|
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
http://advisories.mageia.org/MGASA-2014-0416.html
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
http://askubuntu.com/a/537196
http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
http://downloads.asterisk.org/pub/security/AST-2014-011.html
http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
http://marc.info/?l=bugtraq&m=141450452204552&w=2
http://marc.info/?l=bugtraq&m=141450973807288&w=2
http://marc.info/?l=bugtraq&m=141477196830952&w=2
http://marc.info/?l=bugtraq&m=141576815022399&w=2
http://marc.info/?l=bugtraq&m=141577087123040&w=2
http://marc.info/?l=bugtraq&m=141577350823734&w=2
http://marc.info/?l=bugtraq&m=141620103726640&w=2
http://marc.info/?l=bugtraq&m=141628688425177&w=2
http://marc.info/?l=bugtraq&m=141694355519663&w=2
http://marc.info/?l=bugtraq&m=141697638231025&w=2
http://marc.info/?l=bugtraq&m=141697676231104&w=2
http://marc.info/?l=bugtraq&m=141703183219781&w=2
http://marc.info/?l=bugtraq&m=141715130023061&w=2
http://marc.info/?l=bugtraq&m=141775427104070&w=2
http://marc.info/?l=bugtraq&m=141813976718456&w=2
http://marc.info/?l=bugtraq&m=141814011518700&w=2
http://marc.info/?l=bugtraq&m=141879378918327&w=2
http://marc.info/?l=bugtraq&m=142103967620673&w=2
http://marc.info/?l=bugtraq&m=142118135300698&w=2
http://marc.info/?l=bugtraq&m=142296755107581&w=2
http://marc.info/?l=bugtraq&m=142350196615714&w=2
http://marc.info/?l=bugtraq&m=142350298616097&w=2
http://marc.info/?l=bugtraq&m=142350743917559&w=2
http://marc.info/?l=bugtraq&m=142354438527235&w=2
http://marc.info/?l=bugtraq&m=142357976805598&w=2
http://marc.info/?l=bugtraq&m=142495837901899&w=2
http://marc.info/?l=bugtraq&m=142496355704097&w=2
http://marc.info/?l=bugtraq&m=142546741516006&w=2
http://marc.info/?l=bugtraq&m=142607790919348&w=2
http://marc.info/?l=bugtraq&m=142624590206005&w=2
http://marc.info/?l=bugtraq&m=142624619906067
http://marc.info/?l=bugtraq&m=142624619906067&w=2
http://marc.info/?l=bugtraq&m=142624679706236&w=2
http://marc.info/?l=bugtraq&m=142624719706349&w=2
http://marc.info/?l=bugtraq&m=142660345230545&w=2
http://marc.info/?l=bugtraq&m=142721830231196&w=2
http://marc.info/?l=bugtraq&m=142721887231400&w=2
http://marc.info/?l=bugtraq&m=142740155824959&w=2
http://marc.info/?l=bugtraq&m=142791032306609&w=2
http://marc.info/?l=bugtraq&m=142804214608580&w=2
http://marc.info/?l=bugtraq&m=142805027510172&w=2
http://marc.info/?l=bugtraq&m=142962817202793&w=2
http://marc.info/?l=bugtraq&m=143039249603103&w=2
http://marc.info/?l=bugtraq&m=143101048219218&w=2
http://marc.info/?l=bugtraq&m=143290371927178&w=2
http://marc.info/?l=bugtraq&m=143290437727362&w=2
http://marc.info/?l=bugtraq&m=143290522027658&w=2
http://marc.info/?l=bugtraq&m=143290583027876&w=2
http://marc.info/?l=bugtraq&m=143558137709884&w=2
http://marc.info/?l=bugtraq&m=143558192010071&w=2
http://marc.info/?l=bugtraq&m=143628269912142&w=2
http://marc.info/?l=bugtraq&m=144101915224472&w=2
http://marc.info/?l=bugtraq&m=144251162130364&w=2
http://marc.info/?l=bugtraq&m=144294141001552&w=2
http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=openssl-dev&m=141333049205629&w=2
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
http://rhn.redhat.com/errata/RHSA-2014-1652.html
http://rhn.redhat.com/errata/RHSA-2014-1653.html
http://rhn.redhat.com/errata/RHSA-2014-1692.html
http://rhn.redhat.com/errata/RHSA-2014-1876.html
http://rhn.redhat.com/errata/RHSA-2014-1877.html
http://rhn.redhat.com/errata/RHSA-2014-1880.html
http://rhn.redhat.com/errata/RHSA-2014-1881.html
http://rhn.redhat.com/errata/RHSA-2014-1882.html
http://rhn.redhat.com/errata/RHSA-2014-1920.html
http://rhn.redhat.com/errata/RHSA-2014-1948.html
http://rhn.redhat.com/errata/RHSA-2015-0068.html
http://rhn.redhat.com/errata/RHSA-2015-0079.html
http://rhn.redhat.com/errata/RHSA-2015-0080.html
http://rhn.redhat.com/errata/RHSA-2015-0085.html
http://rhn.redhat.com/errata/RHSA-2015-0086.html
http://rhn.redhat.com/errata/RHSA-2015-0264.html
http://rhn.redhat.com/errata/RHSA-2015-0698.html
http://rhn.redhat.com/errata/RHSA-2015-1545.html
http://rhn.redhat.com/errata/RHSA-2015-1546.html
http://secunia.com/advisories/59627
http://secunia.com/advisories/60056
http://secunia.com/advisories/60206
http://secunia.com/advisories/60792
http://secunia.com/advisories/60859
http://secunia.com/advisories/61019
http://secunia.com/advisories/61130
http://secunia.com/advisories/61303
http://secunia.com/advisories/61316
http://secunia.com/advisories/61345
http://secunia.com/advisories/61359
http://secunia.com/advisories/61782
http://secunia.com/advisories/61810
http://secunia.com/advisories/61819
http://secunia.com/advisories/61825
http://secunia.com/advisories/61827
http://secunia.com/advisories/61926
http://secunia.com/advisories/61995
http://support.apple.com/HT204244
http://support.citrix.com/article/CTX200238
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
http://www-01.ibm.com/support/docview.wss?uid=swg21687172
http://www-01.ibm.com/support/docview.wss?uid=swg21687611
http://www-01.ibm.com/support/docview.wss?uid=swg21688283
http://www-01.ibm.com/support/docview.wss?uid=swg21692299
http://www.debian.org/security/2014/dsa-3053
http://www.debian.org/security/2015/dsa-3144
http://www.debian.org/security/2015/dsa-3147
http://www.debian.org/security/2015/dsa-3253
http://www.debian.org/security/2016/dsa-3489
http://www.kb.cert.org/vuls/id/577193
http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/archive/1/533724/100/0/threaded
http://www.securityfocus.com/archive/1/533746
http://www.securityfocus.com/archive/1/533747
http://www.securityfocus.com/bid/70574
http://www.securitytracker.com/id/1031029
http://www.securitytracker.com/id/1031039
http://www.securitytracker.com/id/1031085
http://www.securitytracker.com/id/1031086
http://www.securitytracker.com/id/1031087
http://www.securitytracker.com/id/1031088
http://www.securitytracker.com/id/1031089
http://www.securitytracker.com/id/1031090
http://www.securitytracker.com/id/1031091
http://www.securitytracker.com/id/1031092
http://www.securitytracker.com/id/1031093
http://www.securitytracker.com/id/1031094
http://www.securitytracker.com/id/1031095
http://www.securitytracker.com/id/1031096
http://www.securitytracker.com/id/1031105
http://www.securitytracker.com/id/1031106
http://www.securitytracker.com/id/1031107
http://www.securitytracker.com/id/1031120
http://www.securitytracker.com/id/1031123
http://www.securitytracker.com/id/1031124
http://www.securitytracker.com/id/1031130
http://www.securitytracker.com/id/1031131
http://www.securitytracker.com/id/1031132
http://www.ubuntu.com/usn/USN-2486-1
http://www.ubuntu.com/usn/USN-2487-1
http://www.us-cert.gov/ncas/alerts/TA14-290A
http://www.vmware.com/security/advisories/VMSA-2015-0003.html
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
https://access.redhat.com/articles/1232123
https://access.redhat.com/security/cve/CVE-2014-3566
https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
https://bto.bluecoat.com/security-advisory/sa83
https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
https://bugzilla.redhat.com/show_bug.cgi?id=1152789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
https://github.com/mpgn/poodle-PoC
https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kc.mcafee.com/corporate/index?page=content&id=SB10090
https://kc.mcafee.com/corporate/index?page=content&id=SB10091
https://kc.mcafee.com/corporate/index?page=content&id=SB10104
https://linux.oracle.com/cve/CVE-2014-3566.html
https://linux.oracle.com/errata/ELSA-2015-0085.html
https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-3566
https://puppet.com/security/cve/poodle-sslv3-vulnerability
https://security.gentoo.org/glsa/201507-14
https://security.gentoo.org/glsa/201606-11
https://security.netapp.com/advisory/ntap-20141015-0001/
https://support.apple.com/HT205217
https://support.apple.com/kb/HT6527
https://support.apple.com/kb/HT6529
https://support.apple.com/kb/HT6531
https://support.apple.com/kb/HT6535
https://support.apple.com/kb/HT6536
https://support.apple.com/kb/HT6541
https://support.apple.com/kb/HT6542
https://support.citrix.com/article/CTX216642
https://support.lenovo.com/product_security/poodle
https://support.lenovo.com/us/en/product_security/poodle
https://technet.microsoft.com/library/security/3009008.aspx
https://ubuntu.com/security/notices/USN-2486-1
https://ubuntu.com/security/notices/USN-2487-1
https://www-01.ibm.com/support/docview.wss?uid=swg21688165
https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
https://www.cve.org/CVERecord?id=CVE-2014-3566
https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
https://www.elastic.co/blog/logstash-1-4-3-released
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/news/secadv_20141015.txt
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://www.suse.com/support/kb/doc.php?id=7015773
|
| nss-sysinit |
CVE-2015-2808 |
MEDIUM |
3.90.0-2.el7_9 |
|
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://nvd.nist.gov/vuln/detail/CVE-2015-2808
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
https://www.cve.org/CVERecord?id=CVE-2015-2808
https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
|
| nss-sysinit |
CVE-2016-2183 |
MEDIUM |
3.90.0-2.el7_9 |
|
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://rhn.redhat.com/errata/RHSA-2017-0462.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/fulldisclosure/2017/May/105
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/542005/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
http://www.securityfocus.com/bid/92630
http://www.securityfocus.com/bid/95568
http://www.securitytracker.com/id/1036696
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3179-1
http://www.ubuntu.com/usn/USN-3194-1
http://www.ubuntu.com/usn/USN-3198-1
http://www.ubuntu.com/usn/USN-3270-1
http://www.ubuntu.com/usn/USN-3372-1
https://access.redhat.com/articles/2548661
https://access.redhat.com/errata/RHSA-2016:1940
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2018:2123
https://access.redhat.com/errata/RHSA-2019:1245
https://access.redhat.com/errata/RHSA-2019:2859
https://access.redhat.com/errata/RHSA-2020:0451
https://access.redhat.com/security/cve/CVE-2016-2183
https://access.redhat.com/security/cve/cve-2016-2183
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
https://bto.bluecoat.com/security-advisory/sa133
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
https://community.qualys.com/thread/16555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
https://linux.oracle.com/cve/CVE-2016-2183.html
https://linux.oracle.com/errata/ELSA-2018-2123.html
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://nvd.nist.gov/vuln/detail/CVE-2016-2183
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
https://seclists.org/bugtraq/2018/Nov/21
https://security-tracker.debian.org/tracker/CVE-2016-2183
https://security.gentoo.org/glsa/201612-16
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20160915-0001/
https://security.netapp.com/advisory/ntap-20170119-0001/
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
https://support.f5.com/csp/article/K13167034
https://sweet32.info/
https://twitter.com/symantec/status/768786631159603200
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://ubuntu.com/security/notices/USN-3270-1
https://ubuntu.com/security/notices/USN-3372-1
https://wiki.opendaylight.org/view/Security_Advisories
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.cve.org/CVERecord?id=CVE-2016-2183
https://www.exploit-db.com/exploits/42091/
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
https://www.tenable.com/security/tns-2017-09
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
|
| nss-sysinit |
CVE-2016-9074 |
MEDIUM |
3.90.0-2.el7_9 |
|
http://www.securityfocus.com/bid/94341
http://www.securitytracker.com/id/1037298
https://access.redhat.com/security/cve/CVE-2016-9074
https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
https://nvd.nist.gov/vuln/detail/CVE-2016-9074
https://security.gentoo.org/glsa/201701-15
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-3163-1
https://www.cve.org/CVERecord?id=CVE-2016-9074
https://www.debian.org/security/2016/dsa-3730
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074
https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-89/
https://www.mozilla.org/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-93/
|
| nss-sysinit |
CVE-2016-9574 |
MEDIUM |
3.90.0-2.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2016-9574
https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
https://nvd.nist.gov/vuln/detail/CVE-2016-9574
https://www.cve.org/CVERecord?id=CVE-2016-9574
|
| nss-sysinit |
CVE-2018-18508 |
MEDIUM |
3.90.0-2.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2018-18508
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.42.1_release_notes
https://linux.oracle.com/cve/CVE-2018-18508.html
https://linux.oracle.com/errata/ELSA-2019-1951.html
https://nvd.nist.gov/vuln/detail/CVE-2018-18508
https://ubuntu.com/security/notices/USN-3898-1
https://ubuntu.com/security/notices/USN-3898-2
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://www.cve.org/CVERecord?id=CVE-2018-18508
|
| nss-sysinit |
CVE-2023-5388 |
MEDIUM |
3.90.0-2.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0108
https://access.redhat.com/security/cve/CVE-2023-5388
https://bugzilla.redhat.com/2243644
https://bugzilla.redhat.com/show_bug.cgi?id=2243644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
https://errata.almalinux.org/9/ALSA-2024-0108.html
https://errata.rockylinux.org/RLSA-2024:0105
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90_2.html
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html
https://linux.oracle.com/cve/CVE-2023-5388.html
https://linux.oracle.com/errata/ELSA-2024-0108.html
https://nvd.nist.gov/vuln/detail/CVE-2023-5388
https://people.redhat.com/~hkario/marvin/
https://www.cve.org/CVERecord?id=CVE-2023-5388
|
| nss-sysinit |
CVE-2023-6135 |
MEDIUM |
3.90.0-2.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0790
https://access.redhat.com/security/cve/CVE-2023-6135
https://bugzilla.mozilla.org/show_bug.cgi?id=1853908
https://bugzilla.redhat.com/2249906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135
https://errata.almalinux.org/9/ALSA-2024-0790.html
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html
https://linux.oracle.com/cve/CVE-2023-6135.html
https://linux.oracle.com/errata/ELSA-2024-0790.html
https://minerva.crocs.fi.muni.cz/
https://nvd.nist.gov/vuln/detail/CVE-2023-6135
https://people.redhat.com/~hkario/marvin/
https://security.gentoo.org/glsa/202401-10
https://ubuntu.com/security/notices/USN-6562-1
https://www.cve.org/CVERecord?id=CVE-2023-6135
https://www.mozilla.org/en-US/security/advisories/mfsa2023-56/#CVE-2023-6135
https://www.mozilla.org/security/advisories/mfsa2023-56/
|
| nss-sysinit |
CVE-2020-12413 |
LOW |
3.90.0-2.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-12413
https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2020-12413
https://nvd.nist.gov/vuln/detail/CVE-2020-12413
https://raccoon-attack.com/
https://raccoon-attack.com/RacoonAttack.pdf
https://www.cve.org/CVERecord?id=CVE-2020-12413
|
| nss-tools |
CVE-2014-3566 |
HIGH |
3.90.0-2.el7_9 |
|
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
http://advisories.mageia.org/MGASA-2014-0416.html
http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
http://askubuntu.com/a/537196
http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
http://downloads.asterisk.org/pub/security/AST-2014-011.html
http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
http://marc.info/?l=bugtraq&m=141450452204552&w=2
http://marc.info/?l=bugtraq&m=141450973807288&w=2
http://marc.info/?l=bugtraq&m=141477196830952&w=2
http://marc.info/?l=bugtraq&m=141576815022399&w=2
http://marc.info/?l=bugtraq&m=141577087123040&w=2
http://marc.info/?l=bugtraq&m=141577350823734&w=2
http://marc.info/?l=bugtraq&m=141620103726640&w=2
http://marc.info/?l=bugtraq&m=141628688425177&w=2
http://marc.info/?l=bugtraq&m=141694355519663&w=2
http://marc.info/?l=bugtraq&m=141697638231025&w=2
http://marc.info/?l=bugtraq&m=141697676231104&w=2
http://marc.info/?l=bugtraq&m=141703183219781&w=2
http://marc.info/?l=bugtraq&m=141715130023061&w=2
http://marc.info/?l=bugtraq&m=141775427104070&w=2
http://marc.info/?l=bugtraq&m=141813976718456&w=2
http://marc.info/?l=bugtraq&m=141814011518700&w=2
http://marc.info/?l=bugtraq&m=141879378918327&w=2
http://marc.info/?l=bugtraq&m=142103967620673&w=2
http://marc.info/?l=bugtraq&m=142118135300698&w=2
http://marc.info/?l=bugtraq&m=142296755107581&w=2
http://marc.info/?l=bugtraq&m=142350196615714&w=2
http://marc.info/?l=bugtraq&m=142350298616097&w=2
http://marc.info/?l=bugtraq&m=142350743917559&w=2
http://marc.info/?l=bugtraq&m=142354438527235&w=2
http://marc.info/?l=bugtraq&m=142357976805598&w=2
http://marc.info/?l=bugtraq&m=142495837901899&w=2
http://marc.info/?l=bugtraq&m=142496355704097&w=2
http://marc.info/?l=bugtraq&m=142546741516006&w=2
http://marc.info/?l=bugtraq&m=142607790919348&w=2
http://marc.info/?l=bugtraq&m=142624590206005&w=2
http://marc.info/?l=bugtraq&m=142624619906067
http://marc.info/?l=bugtraq&m=142624619906067&w=2
http://marc.info/?l=bugtraq&m=142624679706236&w=2
http://marc.info/?l=bugtraq&m=142624719706349&w=2
http://marc.info/?l=bugtraq&m=142660345230545&w=2
http://marc.info/?l=bugtraq&m=142721830231196&w=2
http://marc.info/?l=bugtraq&m=142721887231400&w=2
http://marc.info/?l=bugtraq&m=142740155824959&w=2
http://marc.info/?l=bugtraq&m=142791032306609&w=2
http://marc.info/?l=bugtraq&m=142804214608580&w=2
http://marc.info/?l=bugtraq&m=142805027510172&w=2
http://marc.info/?l=bugtraq&m=142962817202793&w=2
http://marc.info/?l=bugtraq&m=143039249603103&w=2
http://marc.info/?l=bugtraq&m=143101048219218&w=2
http://marc.info/?l=bugtraq&m=143290371927178&w=2
http://marc.info/?l=bugtraq&m=143290437727362&w=2
http://marc.info/?l=bugtraq&m=143290522027658&w=2
http://marc.info/?l=bugtraq&m=143290583027876&w=2
http://marc.info/?l=bugtraq&m=143558137709884&w=2
http://marc.info/?l=bugtraq&m=143558192010071&w=2
http://marc.info/?l=bugtraq&m=143628269912142&w=2
http://marc.info/?l=bugtraq&m=144101915224472&w=2
http://marc.info/?l=bugtraq&m=144251162130364&w=2
http://marc.info/?l=bugtraq&m=144294141001552&w=2
http://marc.info/?l=bugtraq&m=145983526810210&w=2
http://marc.info/?l=openssl-dev&m=141333049205629&w=2
http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
http://rhn.redhat.com/errata/RHSA-2014-1652.html
http://rhn.redhat.com/errata/RHSA-2014-1653.html
http://rhn.redhat.com/errata/RHSA-2014-1692.html
http://rhn.redhat.com/errata/RHSA-2014-1876.html
http://rhn.redhat.com/errata/RHSA-2014-1877.html
http://rhn.redhat.com/errata/RHSA-2014-1880.html
http://rhn.redhat.com/errata/RHSA-2014-1881.html
http://rhn.redhat.com/errata/RHSA-2014-1882.html
http://rhn.redhat.com/errata/RHSA-2014-1920.html
http://rhn.redhat.com/errata/RHSA-2014-1948.html
http://rhn.redhat.com/errata/RHSA-2015-0068.html
http://rhn.redhat.com/errata/RHSA-2015-0079.html
http://rhn.redhat.com/errata/RHSA-2015-0080.html
http://rhn.redhat.com/errata/RHSA-2015-0085.html
http://rhn.redhat.com/errata/RHSA-2015-0086.html
http://rhn.redhat.com/errata/RHSA-2015-0264.html
http://rhn.redhat.com/errata/RHSA-2015-0698.html
http://rhn.redhat.com/errata/RHSA-2015-1545.html
http://rhn.redhat.com/errata/RHSA-2015-1546.html
http://secunia.com/advisories/59627
http://secunia.com/advisories/60056
http://secunia.com/advisories/60206
http://secunia.com/advisories/60792
http://secunia.com/advisories/60859
http://secunia.com/advisories/61019
http://secunia.com/advisories/61130
http://secunia.com/advisories/61303
http://secunia.com/advisories/61316
http://secunia.com/advisories/61345
http://secunia.com/advisories/61359
http://secunia.com/advisories/61782
http://secunia.com/advisories/61810
http://secunia.com/advisories/61819
http://secunia.com/advisories/61825
http://secunia.com/advisories/61827
http://secunia.com/advisories/61926
http://secunia.com/advisories/61995
http://support.apple.com/HT204244
http://support.citrix.com/article/CTX200238
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
http://www-01.ibm.com/support/docview.wss?uid=swg21686997
http://www-01.ibm.com/support/docview.wss?uid=swg21687172
http://www-01.ibm.com/support/docview.wss?uid=swg21687611
http://www-01.ibm.com/support/docview.wss?uid=swg21688283
http://www-01.ibm.com/support/docview.wss?uid=swg21692299
http://www.debian.org/security/2014/dsa-3053
http://www.debian.org/security/2015/dsa-3144
http://www.debian.org/security/2015/dsa-3147
http://www.debian.org/security/2015/dsa-3253
http://www.debian.org/security/2016/dsa-3489
http://www.kb.cert.org/vuls/id/577193
http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/archive/1/533724/100/0/threaded
http://www.securityfocus.com/archive/1/533746
http://www.securityfocus.com/archive/1/533747
http://www.securityfocus.com/bid/70574
http://www.securitytracker.com/id/1031029
http://www.securitytracker.com/id/1031039
http://www.securitytracker.com/id/1031085
http://www.securitytracker.com/id/1031086
http://www.securitytracker.com/id/1031087
http://www.securitytracker.com/id/1031088
http://www.securitytracker.com/id/1031089
http://www.securitytracker.com/id/1031090
http://www.securitytracker.com/id/1031091
http://www.securitytracker.com/id/1031092
http://www.securitytracker.com/id/1031093
http://www.securitytracker.com/id/1031094
http://www.securitytracker.com/id/1031095
http://www.securitytracker.com/id/1031096
http://www.securitytracker.com/id/1031105
http://www.securitytracker.com/id/1031106
http://www.securitytracker.com/id/1031107
http://www.securitytracker.com/id/1031120
http://www.securitytracker.com/id/1031123
http://www.securitytracker.com/id/1031124
http://www.securitytracker.com/id/1031130
http://www.securitytracker.com/id/1031131
http://www.securitytracker.com/id/1031132
http://www.ubuntu.com/usn/USN-2486-1
http://www.ubuntu.com/usn/USN-2487-1
http://www.us-cert.gov/ncas/alerts/TA14-290A
http://www.vmware.com/security/advisories/VMSA-2015-0003.html
http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
https://access.redhat.com/articles/1232123
https://access.redhat.com/security/cve/CVE-2014-3566
https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
https://bto.bluecoat.com/security-advisory/sa83
https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
https://bugzilla.redhat.com/show_bug.cgi?id=1152789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
https://github.com/mpgn/poodle-PoC
https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kc.mcafee.com/corporate/index?page=content&id=SB10090
https://kc.mcafee.com/corporate/index?page=content&id=SB10091
https://kc.mcafee.com/corporate/index?page=content&id=SB10104
https://linux.oracle.com/cve/CVE-2014-3566.html
https://linux.oracle.com/errata/ELSA-2015-0085.html
https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-3566
https://puppet.com/security/cve/poodle-sslv3-vulnerability
https://security.gentoo.org/glsa/201507-14
https://security.gentoo.org/glsa/201606-11
https://security.netapp.com/advisory/ntap-20141015-0001/
https://support.apple.com/HT205217
https://support.apple.com/kb/HT6527
https://support.apple.com/kb/HT6529
https://support.apple.com/kb/HT6531
https://support.apple.com/kb/HT6535
https://support.apple.com/kb/HT6536
https://support.apple.com/kb/HT6541
https://support.apple.com/kb/HT6542
https://support.citrix.com/article/CTX216642
https://support.lenovo.com/product_security/poodle
https://support.lenovo.com/us/en/product_security/poodle
https://technet.microsoft.com/library/security/3009008.aspx
https://ubuntu.com/security/notices/USN-2486-1
https://ubuntu.com/security/notices/USN-2487-1
https://www-01.ibm.com/support/docview.wss?uid=swg21688165
https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
https://www.cve.org/CVERecord?id=CVE-2014-3566
https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
https://www.elastic.co/blog/logstash-1-4-3-released
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/news/secadv_20141015.txt
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://www.suse.com/support/kb/doc.php?id=7015773
|
| nss-tools |
CVE-2015-2808 |
MEDIUM |
3.90.0-2.el7_9 |
|
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://nvd.nist.gov/vuln/detail/CVE-2015-2808
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
https://www.cve.org/CVERecord?id=CVE-2015-2808
https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
|
| nss-tools |
CVE-2016-2183 |
MEDIUM |
3.90.0-2.el7_9 |
|
http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
http://rhn.redhat.com/errata/RHSA-2017-0336.html
http://rhn.redhat.com/errata/RHSA-2017-0337.html
http://rhn.redhat.com/errata/RHSA-2017-0338.html
http://rhn.redhat.com/errata/RHSA-2017-0462.html
http://seclists.org/fulldisclosure/2017/Jul/31
http://seclists.org/fulldisclosure/2017/May/105
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.debian.org/security/2016/dsa-3673
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.securityfocus.com/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/542005/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
http://www.securityfocus.com/bid/92630
http://www.securityfocus.com/bid/95568
http://www.securitytracker.com/id/1036696
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3179-1
http://www.ubuntu.com/usn/USN-3194-1
http://www.ubuntu.com/usn/USN-3198-1
http://www.ubuntu.com/usn/USN-3270-1
http://www.ubuntu.com/usn/USN-3372-1
https://access.redhat.com/articles/2548661
https://access.redhat.com/errata/RHSA-2016:1940
https://access.redhat.com/errata/RHSA-2017:1216
https://access.redhat.com/errata/RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2018:2123
https://access.redhat.com/errata/RHSA-2019:1245
https://access.redhat.com/errata/RHSA-2019:2859
https://access.redhat.com/errata/RHSA-2020:0451
https://access.redhat.com/security/cve/CVE-2016-2183
https://access.redhat.com/security/cve/cve-2016-2183
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
https://bto.bluecoat.com/security-advisory/sa133
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
https://community.qualys.com/thread/16555
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
https://linux.oracle.com/cve/CVE-2016-2183.html
https://linux.oracle.com/errata/ELSA-2018-2123.html
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://nvd.nist.gov/vuln/detail/CVE-2016-2183
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575
https://seclists.org/bugtraq/2018/Nov/21
https://security-tracker.debian.org/tracker/CVE-2016-2183
https://security.gentoo.org/glsa/201612-16
https://security.gentoo.org/glsa/201701-65
https://security.gentoo.org/glsa/201707-01
https://security.netapp.com/advisory/ntap-20160915-0001/
https://security.netapp.com/advisory/ntap-20170119-0001/
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
https://support.f5.com/csp/article/K13167034
https://sweet32.info/
https://twitter.com/symantec/status/768786631159603200
https://ubuntu.com/security/notices/USN-3087-1
https://ubuntu.com/security/notices/USN-3179-1
https://ubuntu.com/security/notices/USN-3194-1
https://ubuntu.com/security/notices/USN-3198-1
https://ubuntu.com/security/notices/USN-3270-1
https://ubuntu.com/security/notices/USN-3372-1
https://wiki.opendaylight.org/view/Security_Advisories
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
https://www.cve.org/CVERecord?id=CVE-2016-2183
https://www.exploit-db.com/exploits/42091/
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
https://www.suse.com/security/cve/CVE-2016-2183.html
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
https://www.tenable.com/security/tns-2017-09
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
|
| nss-tools |
CVE-2016-9074 |
MEDIUM |
3.90.0-2.el7_9 |
|
http://www.securityfocus.com/bid/94341
http://www.securitytracker.com/id/1037298
https://access.redhat.com/security/cve/CVE-2016-9074
https://bugzilla.mozilla.org/show_bug.cgi?id=1293334
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074
https://nvd.nist.gov/vuln/detail/CVE-2016-9074
https://security.gentoo.org/glsa/201701-15
https://security.gentoo.org/glsa/201701-46
https://ubuntu.com/security/notices/USN-3163-1
https://www.cve.org/CVERecord?id=CVE-2016-9074
https://www.debian.org/security/2016/dsa-3730
https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074
https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-89/
https://www.mozilla.org/security/advisories/mfsa2016-90/
https://www.mozilla.org/security/advisories/mfsa2016-93/
|
| nss-tools |
CVE-2016-9574 |
MEDIUM |
3.90.0-2.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2016-9574
https://bugzilla.mozilla.org/show_bug.cgi?id=1320695
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
https://nvd.nist.gov/vuln/detail/CVE-2016-9574
https://www.cve.org/CVERecord?id=CVE-2016-9574
|
| nss-tools |
CVE-2018-18508 |
MEDIUM |
3.90.0-2.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2018-18508
https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.42.1_release_notes
https://linux.oracle.com/cve/CVE-2018-18508.html
https://linux.oracle.com/errata/ELSA-2019-1951.html
https://nvd.nist.gov/vuln/detail/CVE-2018-18508
https://ubuntu.com/security/notices/USN-3898-1
https://ubuntu.com/security/notices/USN-3898-2
https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
https://www.cve.org/CVERecord?id=CVE-2018-18508
|
| nss-tools |
CVE-2023-5388 |
MEDIUM |
3.90.0-2.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0108
https://access.redhat.com/security/cve/CVE-2023-5388
https://bugzilla.redhat.com/2243644
https://bugzilla.redhat.com/show_bug.cgi?id=2243644
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388
https://errata.almalinux.org/9/ALSA-2024-0108.html
https://errata.rockylinux.org/RLSA-2024:0105
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_90_2.html
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_98.html
https://linux.oracle.com/cve/CVE-2023-5388.html
https://linux.oracle.com/errata/ELSA-2024-0108.html
https://nvd.nist.gov/vuln/detail/CVE-2023-5388
https://people.redhat.com/~hkario/marvin/
https://www.cve.org/CVERecord?id=CVE-2023-5388
|
| nss-tools |
CVE-2023-6135 |
MEDIUM |
3.90.0-2.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0790
https://access.redhat.com/security/cve/CVE-2023-6135
https://bugzilla.mozilla.org/show_bug.cgi?id=1853908
https://bugzilla.redhat.com/2249906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135
https://errata.almalinux.org/9/ALSA-2024-0790.html
https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_95.html
https://linux.oracle.com/cve/CVE-2023-6135.html
https://linux.oracle.com/errata/ELSA-2024-0790.html
https://minerva.crocs.fi.muni.cz/
https://nvd.nist.gov/vuln/detail/CVE-2023-6135
https://people.redhat.com/~hkario/marvin/
https://security.gentoo.org/glsa/202401-10
https://ubuntu.com/security/notices/USN-6562-1
https://www.cve.org/CVERecord?id=CVE-2023-6135
https://www.mozilla.org/en-US/security/advisories/mfsa2023-56/#CVE-2023-6135
https://www.mozilla.org/security/advisories/mfsa2023-56/
|
| nss-tools |
CVE-2020-12413 |
LOW |
3.90.0-2.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-12413
https://bugzilla.mozilla.org/show_bug.cgi?id=CVE-2020-12413
https://nvd.nist.gov/vuln/detail/CVE-2020-12413
https://raccoon-attack.com/
https://raccoon-attack.com/RacoonAttack.pdf
https://www.cve.org/CVERecord?id=CVE-2020-12413
|
| openldap |
CVE-2019-13057 |
MEDIUM |
2.4.44-25.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://seclists.org/fulldisclosure/2019/Dec/26
http://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://access.redhat.com/security/cve/CVE-2019-13057
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13057
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html
https://nvd.nist.gov/vuln/detail/CVE-2019-13057
https://openldap.org/its/?findid=9038
https://seclists.org/bugtraq/2019/Dec/23
https://security.netapp.com/advisory/ntap-20190822-0004/
https://support.apple.com/kb/HT210788
https://ubuntu.com/security/notices/USN-4078-1
https://ubuntu.com/security/notices/USN-4078-2
https://usn.ubuntu.com/4078-1/
https://usn.ubuntu.com/4078-2/
https://www.cve.org/CVERecord?id=CVE-2019-13057
https://www.openldap.org/its/?findid=9038
https://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| openldap |
CVE-2019-13565 |
MEDIUM |
2.4.44-25.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html
http://seclists.org/fulldisclosure/2019/Dec/26
http://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://access.redhat.com/security/cve/CVE-2019-13565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13565
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html
https://nvd.nist.gov/vuln/detail/CVE-2019-13565
https://openldap.org/its/?findid=9052
https://seclists.org/bugtraq/2019/Dec/23
https://support.apple.com/kb/HT210788
https://support.f5.com/csp/article/K98008862?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4078-1
https://ubuntu.com/security/notices/USN-4078-2
https://usn.ubuntu.com/4078-1/
https://usn.ubuntu.com/4078-2/
https://www.cve.org/CVERecord?id=CVE-2019-13565
https://www.openldap.org/its/index.cgi/?findid=9052
https://www.openldap.org/lists/openldap-announce/201907/msg00001.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| openldap |
CVE-2020-36221 |
MEDIUM |
2.4.44-25.el7_9 |
|
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36221
https://bugs.openldap.org/show_bug.cgi?id=9404
https://bugs.openldap.org/show_bug.cgi?id=9424
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36221
https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31
https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36221
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.cve.org/CVERecord?id=CVE-2020-36221
https://www.debian.org/security/2021/dsa-4845
|
| openldap |
CVE-2020-36222 |
MEDIUM |
2.4.44-25.el7_9 |
|
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36222
https://bugs.openldap.org/show_bug.cgi?id=9406
https://bugs.openldap.org/show_bug.cgi?id=9407
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36222
https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0
https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed
https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36222
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.cve.org/CVERecord?id=CVE-2020-36222
https://www.debian.org/security/2021/dsa-4845
|
| openldap |
CVE-2020-36223 |
MEDIUM |
2.4.44-25.el7_9 |
|
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36223
https://bugs.openldap.org/show_bug.cgi?id=9408
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36223
https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36223
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.cve.org/CVERecord?id=CVE-2020-36223
https://www.debian.org/security/2021/dsa-4845
|
| openldap |
CVE-2020-36224 |
MEDIUM |
2.4.44-25.el7_9 |
|
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36224
https://bugs.openldap.org/show_bug.cgi?id=9409
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36224
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36224
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.cve.org/CVERecord?id=CVE-2020-36224
https://www.debian.org/security/2021/dsa-4845
|
| openldap |
CVE-2020-36225 |
MEDIUM |
2.4.44-25.el7_9 |
|
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36225
https://bugs.openldap.org/show_bug.cgi?id=9412
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36225
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36225
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.cve.org/CVERecord?id=CVE-2020-36225
https://www.debian.org/security/2021/dsa-4845
|
| openldap |
CVE-2020-36226 |
MEDIUM |
2.4.44-25.el7_9 |
|
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36226
https://bugs.openldap.org/show_bug.cgi?id=9413
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36226
https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65
https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26
https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439
https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36226
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.cve.org/CVERecord?id=CVE-2020-36226
https://www.debian.org/security/2021/dsa-4845
|
| openldap |
CVE-2020-36227 |
MEDIUM |
2.4.44-25.el7_9 |
|
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36227
https://bugs.openldap.org/show_bug.cgi?id=9428
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36227
https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36227
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.cve.org/CVERecord?id=CVE-2020-36227
https://www.debian.org/security/2021/dsa-4845
|
| openldap |
CVE-2020-36228 |
MEDIUM |
2.4.44-25.el7_9 |
|
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36228
https://bugs.openldap.org/show_bug.cgi?id=9427
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36228
https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36228
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.cve.org/CVERecord?id=CVE-2020-36228
https://www.debian.org/security/2021/dsa-4845
|
| openldap |
CVE-2020-36229 |
MEDIUM |
2.4.44-25.el7_9 |
|
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36229
https://bugs.openldap.org/show_bug.cgi?id=9425
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36229
https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36229
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.cve.org/CVERecord?id=CVE-2020-36229
https://www.debian.org/security/2021/dsa-4845
|
| openldap |
CVE-2020-36230 |
MEDIUM |
2.4.44-25.el7_9 |
|
http://seclists.org/fulldisclosure/2021/May/64
http://seclists.org/fulldisclosure/2021/May/65
http://seclists.org/fulldisclosure/2021/May/70
https://access.redhat.com/security/cve/CVE-2020-36230
https://bugs.openldap.org/show_bug.cgi?id=9423
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36230
https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793
https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html
https://nvd.nist.gov/vuln/detail/CVE-2020-36230
https://security.netapp.com/advisory/ntap-20210226-0002/
https://support.apple.com/kb/HT212529
https://support.apple.com/kb/HT212530
https://support.apple.com/kb/HT212531
https://ubuntu.com/security/notices/USN-4724-1
https://www.cve.org/CVERecord?id=CVE-2020-36230
https://www.debian.org/security/2021/dsa-4845
|
| openldap |
CVE-2021-27212 |
MEDIUM |
2.4.44-25.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-27212
https://bugs.openldap.org/show_bug.cgi?id=9454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212
https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0
https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html
https://nvd.nist.gov/vuln/detail/CVE-2021-27212
https://security.netapp.com/advisory/ntap-20210319-0005/
https://ubuntu.com/security/notices/USN-4744-1
https://www.cve.org/CVERecord?id=CVE-2021-27212
https://www.debian.org/security/2021/dsa-4860
|
| openldap |
CVE-2022-29155 |
MEDIUM |
2.4.44-25.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-29155
https://bugs.openldap.org/show_bug.cgi?id=9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155
https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29155
https://security.netapp.com/advisory/ntap-20220609-0007/
https://ubuntu.com/security/notices/USN-5424-1
https://ubuntu.com/security/notices/USN-5424-2
https://www.cve.org/CVERecord?id=CVE-2022-29155
https://www.debian.org/security/2022/dsa-5140
|
| openldap |
CVE-2016-4984 |
LOW |
2.4.44-25.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2016-4984
https://bugzilla.redhat.com/show_bug.cgi?id=1346120
https://nvd.nist.gov/vuln/detail/CVE-2016-4984
https://www.cve.org/CVERecord?id=CVE-2016-4984
|
| openldap |
CVE-2020-15719 |
LOW |
2.4.44-25.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html
https://access.redhat.com/errata/RHBA-2019:3674
https://access.redhat.com/security/cve/CVE-2020-15719
https://bugs.openldap.org/show_bug.cgi?id=9266
https://bugzilla.redhat.com/show_bug.cgi?id=1740070
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://nvd.nist.gov/vuln/detail/CVE-2020-15719
https://www.cve.org/CVERecord?id=CVE-2020-15719
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| openldap |
CVE-2023-2953 |
LOW |
2.4.44-25.el7_9 |
|
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://access.redhat.com/security/cve/CVE-2023-2953
https://bugs.openldap.org/show_bug.cgi?id=9904
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2953
https://nvd.nist.gov/vuln/detail/CVE-2023-2953
https://security.netapp.com/advisory/ntap-20230703-0005/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6197-1
https://ubuntu.com/security/notices/USN-6616-1
https://www.cve.org/CVERecord?id=CVE-2023-2953
|
| openssl |
CVE-2015-2808 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://nvd.nist.gov/vuln/detail/CVE-2015-2808
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
https://www.cve.org/CVERecord?id=CVE-2015-2808
https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
|
| openssl |
CVE-2019-1547 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1547
https://arxiv.org/abs/1909.01785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=21c856b75d81eff61aa63b4f036bb64a85bf6d46
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30c22fa8b1d840036b8e203585738df62a03cec8
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1547.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://nvd.nist.gov/vuln/detail/CVE-2019-1547
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://security.netapp.com/advisory/ntap-20200122-0002/
https://security.netapp.com/advisory/ntap-20200416-0003/
https://support.f5.com/csp/article/K73422160?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.cve.org/CVERecord?id=CVE-2019-1547
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-08
https://www.tenable.com/security/tns-2019-09
|
| openssl |
CVE-2022-1292 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2022:6224
https://access.redhat.com/security/cve/CVE-2022-1292
https://bugzilla.redhat.com/2081494
https://bugzilla.redhat.com/2087911
https://bugzilla.redhat.com/2087913
https://bugzilla.redhat.com/2097310
https://bugzilla.redhat.com/2104905
https://bugzilla.redhat.com/show_bug.cgi?id=2081494
https://bugzilla.redhat.com/show_bug.cgi?id=2097310
https://bugzilla.redhat.com/show_bug.cgi?id=2100554
https://bugzilla.redhat.com/show_bug.cgi?id=2104905
https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097
https://errata.almalinux.org/9/ALSA-2022-6224.html
https://errata.rockylinux.org/RLSA-2022:5818
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://linux.oracle.com/cve/CVE-2022-1292.html
https://linux.oracle.com/errata/ELSA-2022-9751.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0011
https://security.gentoo.org/glsa/202210-02
https://security.netapp.com/advisory/ntap-20220602-0009/
https://security.netapp.com/advisory/ntap-20220729-0004/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://ubuntu.com/security/notices/USN-6457-1
https://www.cve.org/CVERecord?id=CVE-2022-1292
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
https://www.oracle.com/security-alerts/cpujul2022.html
|
| openssl |
CVE-2022-2068 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2022:6224
https://access.redhat.com/security/cve/CVE-2022-2068
https://bugzilla.redhat.com/2081494
https://bugzilla.redhat.com/2087911
https://bugzilla.redhat.com/2087913
https://bugzilla.redhat.com/2097310
https://bugzilla.redhat.com/2104905
https://bugzilla.redhat.com/show_bug.cgi?id=2081494
https://bugzilla.redhat.com/show_bug.cgi?id=2097310
https://bugzilla.redhat.com/show_bug.cgi?id=2100554
https://bugzilla.redhat.com/show_bug.cgi?id=2104905
https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097
https://errata.almalinux.org/9/ALSA-2022-6224.html
https://errata.rockylinux.org/RLSA-2022:5818
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9639817dac8bbbaa64d09efad7464ccc405527c7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://linux.oracle.com/cve/CVE-2022-2068.html
https://linux.oracle.com/errata/ELSA-2022-9751.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WZZBKUHQFGSKGNXXKICSRPL7AMVW5M5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/
https://nvd.nist.gov/vuln/detail/CVE-2022-2068
https://security.netapp.com/advisory/ntap-20220707-0008/
https://ubuntu.com/security/notices/USN-5488-1
https://ubuntu.com/security/notices/USN-5488-2
https://ubuntu.com/security/notices/USN-6457-1
https://www.cve.org/CVERecord?id=CVE-2022-2068
https://www.debian.org/security/2022/dsa-5169
https://www.openssl.org/news/secadv/20220621.txt
|
| openssl |
CVE-2022-4304 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:2165
https://access.redhat.com/security/cve/CVE-2022-4304
https://bugzilla.redhat.com/1960321
https://bugzilla.redhat.com/2164440
https://bugzilla.redhat.com/2164487
https://bugzilla.redhat.com/2164492
https://bugzilla.redhat.com/2164494
https://bugzilla.redhat.com/show_bug.cgi?id=2144000
https://bugzilla.redhat.com/show_bug.cgi?id=2144003
https://bugzilla.redhat.com/show_bug.cgi?id=2144006
https://bugzilla.redhat.com/show_bug.cgi?id=2144008
https://bugzilla.redhat.com/show_bug.cgi?id=2144010
https://bugzilla.redhat.com/show_bug.cgi?id=2144012
https://bugzilla.redhat.com/show_bug.cgi?id=2144015
https://bugzilla.redhat.com/show_bug.cgi?id=2144017
https://bugzilla.redhat.com/show_bug.cgi?id=2144019
https://bugzilla.redhat.com/show_bug.cgi?id=2145170
https://bugzilla.redhat.com/show_bug.cgi?id=2158412
https://bugzilla.redhat.com/show_bug.cgi?id=2164440
https://bugzilla.redhat.com/show_bug.cgi?id=2164487
https://bugzilla.redhat.com/show_bug.cgi?id=2164488
https://bugzilla.redhat.com/show_bug.cgi?id=2164492
https://bugzilla.redhat.com/show_bug.cgi?id=2164494
https://bugzilla.redhat.com/show_bug.cgi?id=2164497
https://bugzilla.redhat.com/show_bug.cgi?id=2164499
https://bugzilla.redhat.com/show_bug.cgi?id=2164500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0401
https://errata.almalinux.org/9/ALSA-2023-2165.html
https://errata.rockylinux.org/RLSA-2023:0946
https://linux.oracle.com/cve/CVE-2022-4304.html
https://linux.oracle.com/errata/ELSA-2023-32791.html
https://nvd.nist.gov/vuln/detail/CVE-2022-4304
https://rustsec.org/advisories/RUSTSEC-2023-0007.html
https://security.gentoo.org/glsa/202402-08
https://ubuntu.com/security/notices/USN-5844-1
https://ubuntu.com/security/notices/USN-6564-1
https://www.cve.org/CVERecord?id=CVE-2022-4304
https://www.openssl.org/news/secadv/20230207.txt
|
| openssl |
CVE-2023-0215 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:2165
https://access.redhat.com/security/cve/CVE-2023-0215
https://bugzilla.redhat.com/1960321
https://bugzilla.redhat.com/2164440
https://bugzilla.redhat.com/2164487
https://bugzilla.redhat.com/2164492
https://bugzilla.redhat.com/2164494
https://bugzilla.redhat.com/show_bug.cgi?id=2144000
https://bugzilla.redhat.com/show_bug.cgi?id=2144003
https://bugzilla.redhat.com/show_bug.cgi?id=2144006
https://bugzilla.redhat.com/show_bug.cgi?id=2144008
https://bugzilla.redhat.com/show_bug.cgi?id=2144010
https://bugzilla.redhat.com/show_bug.cgi?id=2144012
https://bugzilla.redhat.com/show_bug.cgi?id=2144015
https://bugzilla.redhat.com/show_bug.cgi?id=2144017
https://bugzilla.redhat.com/show_bug.cgi?id=2144019
https://bugzilla.redhat.com/show_bug.cgi?id=2145170
https://bugzilla.redhat.com/show_bug.cgi?id=2158412
https://bugzilla.redhat.com/show_bug.cgi?id=2164440
https://bugzilla.redhat.com/show_bug.cgi?id=2164487
https://bugzilla.redhat.com/show_bug.cgi?id=2164488
https://bugzilla.redhat.com/show_bug.cgi?id=2164492
https://bugzilla.redhat.com/show_bug.cgi?id=2164494
https://bugzilla.redhat.com/show_bug.cgi?id=2164497
https://bugzilla.redhat.com/show_bug.cgi?id=2164499
https://bugzilla.redhat.com/show_bug.cgi?id=2164500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0401
https://errata.almalinux.org/9/ALSA-2023-2165.html
https://errata.rockylinux.org/RLSA-2023:0946
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8818064ce3c3c0f1b740a5aaba2a987e75bfbafd
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9816136fe31d92ace4037d5da5257f763aeeb4eb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c3829dd8825c654652201e16f8a0a0c46ee3f344
https://linux.oracle.com/cve/CVE-2023-0215.html
https://linux.oracle.com/errata/ELSA-2023-32791.html
https://nvd.nist.gov/vuln/detail/CVE-2023-0215
https://rustsec.org/advisories/RUSTSEC-2023-0009.html
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230427-0007
https://security.netapp.com/advisory/ntap-20230427-0007/
https://security.netapp.com/advisory/ntap-20230427-0009
https://security.netapp.com/advisory/ntap-20230427-0009/
https://ubuntu.com/security/notices/USN-5844-1
https://ubuntu.com/security/notices/USN-5845-1
https://ubuntu.com/security/notices/USN-5845-2
https://ubuntu.com/security/notices/USN-6564-1
https://www.cve.org/CVERecord?id=CVE-2023-0215
https://www.openssl.org/news/secadv/20230207.txt
|
| openssl |
CVE-2023-2650 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/05/30/1
https://access.redhat.com/errata/RHSA-2023:6330
https://access.redhat.com/security/cve/CVE-2023-2650
https://bugzilla.redhat.com/1858038
https://bugzilla.redhat.com/2207947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650
https://errata.almalinux.org/9/ALSA-2023-6330.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=423a2bc737a908ad0c77bda470b2b59dc879936b
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=853c5e56ee0b8650c73140816bb8b91d6163422c
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9e209944b35cf82368071f160a744b6178f9b098
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db779b0e10b047f2585615e0b8f2acdf21f8544a
https://linux.oracle.com/cve/CVE-2023-2650.html
https://linux.oracle.com/errata/ELSA-2023-6330.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2023-2650
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0009
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230703-0001/
https://security.netapp.com/advisory/ntap-20231027-0009/
https://ubuntu.com/security/notices/USN-6119-1
https://ubuntu.com/security/notices/USN-6188-1
https://ubuntu.com/security/notices/USN-6672-1
https://www.cve.org/CVERecord?id=CVE-2023-2650
https://www.debian.org/security/2023/dsa-5417
https://www.openssl.org/news/secadv/20230530.txt
|
| openssl |
CVE-2019-1551 |
LOW |
1:1.0.2k-26.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=419102400a2811582a7a3d4a4e317d72e5ce0a8f
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f1c5eea8a817075d31e43f5876993c6710238c98
https://github.com/openssl/openssl/pull/10575
https://linux.oracle.com/cve/CVE-2019-1551.html
https://linux.oracle.com/errata/ELSA-2020-4514.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/
https://nvd.nist.gov/vuln/detail/CVE-2019-1551
https://seclists.org/bugtraq/2019/Dec/39
https://seclists.org/bugtraq/2019/Dec/46
https://security.gentoo.org/glsa/202004-10
https://security.netapp.com/advisory/ntap-20191210-0001/
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4504-1/
https://www.cve.org/CVERecord?id=CVE-2019-1551
https://www.debian.org/security/2019/dsa-4594
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20191206.txt
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.tenable.com/security/tns-2019-09
https://www.tenable.com/security/tns-2020-03
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-10
|
| openssl |
CVE-2019-1563 |
LOW |
1:1.0.2k-26.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=08229ad838c50f644d7e928e2eef147b4308ad64
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=631f94db0065c78181ca9ba5546ebc8bb3884b97
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1563.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://nvd.nist.gov/vuln/detail/CVE-2019-1563
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://support.f5.com/csp/article/K97324400?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.cve.org/CVERecord?id=CVE-2019-1563
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-09
|
| openssl |
CVE-2020-1968 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968
https://lists.debian.org/debian-lts-announce/2020/09/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1968
https://raccoon-attack.com/RacoonAttack.pdf
https://security.gentoo.org/glsa/202210-02
https://security.netapp.com/advisory/ntap-20200911-0004/
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4504-1/
https://www.cve.org/CVERecord?id=CVE-2020-1968
https://www.openssl.org/news/secadv/20200909.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| openssl |
CVE-2021-3601 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-3601
https://nvd.nist.gov/vuln/detail/CVE-2021-3601
https://www.cve.org/CVERecord?id=CVE-2021-3601
|
| openssl |
CVE-2022-3358 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:2523
https://access.redhat.com/security/cve/CVE-2022-3358
https://bugzilla.redhat.com/2134740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3358
https://errata.almalinux.org/9/ALSA-2023-2523.html
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b
https://github.com/alexcrichton/openssl-src-rs
https://linux.oracle.com/cve/CVE-2022-3358.html
https://linux.oracle.com/errata/ELSA-2023-2523.html
https://nvd.nist.gov/vuln/detail/CVE-2022-3358
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023
https://rustsec.org/advisories/RUSTSEC-2022-0059.html
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20221028-0014
https://security.netapp.com/advisory/ntap-20221028-0014/
https://ubuntu.com/security/notices/USN-5710-1
https://www.cve.org/CVERecord?id=CVE-2022-3358
https://www.openssl.org/news/secadv/20221011.txt
|
| openssl |
CVE-2023-0464 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:3722
https://access.redhat.com/security/cve/CVE-2023-0464
https://bugzilla.redhat.com/2181082
https://bugzilla.redhat.com/2182561
https://bugzilla.redhat.com/2182565
https://bugzilla.redhat.com/2188461
https://bugzilla.redhat.com/2207947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464
https://errata.almalinux.org/9/ALSA-2023-3722.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2dcd4f1e3115f38cefa43e3efbe9b801c27e642e
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=879f7080d7e141f415c79eaa3a8ac4a3dad0348b
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1
https://linux.oracle.com/cve/CVE-2023-0464.html
https://linux.oracle.com/errata/ELSA-2023-3722.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2023-0464
https://security.gentoo.org/glsa/202402-08
https://ubuntu.com/security/notices/USN-6039-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-0464
https://www.debian.org/security/2023/dsa-5417
https://www.openssl.org/news/secadv/20230322.txt
|
| openssl |
CVE-2023-0465 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:3722
https://access.redhat.com/security/cve/CVE-2023-0465
https://bugzilla.redhat.com/2181082
https://bugzilla.redhat.com/2182561
https://bugzilla.redhat.com/2182565
https://bugzilla.redhat.com/2188461
https://bugzilla.redhat.com/2207947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465
https://errata.almalinux.org/9/ALSA-2023-3722.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b013765abfa80036dc779dd0e50602c57bb3bf95
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=facfb1ab745646e97a1920977ae4a9965ea61d5c
https://linux.oracle.com/cve/CVE-2023-0465.html
https://linux.oracle.com/errata/ELSA-2023-3722.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2023-0465
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230414-0001/
https://ubuntu.com/security/notices/USN-6039-1
https://www.cve.org/CVERecord?id=CVE-2023-0465
https://www.debian.org/security/2023/dsa-5417
https://www.openssl.org/news/secadv/20230328.txt
|
| openssl |
CVE-2023-0466 |
LOW |
1:1.0.2k-26.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/09/28/4
https://access.redhat.com/errata/RHSA-2023:3722
https://access.redhat.com/security/cve/CVE-2023-0466
https://bugzilla.redhat.com/2181082
https://bugzilla.redhat.com/2182561
https://bugzilla.redhat.com/2182565
https://bugzilla.redhat.com/2188461
https://bugzilla.redhat.com/2207947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0466
https://errata.almalinux.org/9/ALSA-2023-3722.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0d16b7e99aafc0b4a6d729eec65a411a7e025f0a
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=73398dea26de9899fb4baa94098ad0a61f435c72
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc814a30fc4f0bc54fcea7d9a7462f5457aab061
https://linux.oracle.com/cve/CVE-2023-0466.html
https://linux.oracle.com/errata/ELSA-2023-3722.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2023-0466
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230414-0001/
https://ubuntu.com/security/notices/USN-6039-1
https://www.cve.org/CVERecord?id=CVE-2023-0466
https://www.debian.org/security/2023/dsa-5417
https://www.openssl.org/news/secadv/20230328.txt
|
| openssl |
CVE-2023-3446 |
LOW |
1:1.0.2k-26.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/07/19/4
http://www.openwall.com/lists/oss-security/2023/07/19/5
http://www.openwall.com/lists/oss-security/2023/07/19/6
http://www.openwall.com/lists/oss-security/2023/07/31/1
https://access.redhat.com/errata/RHSA-2024:0888
https://access.redhat.com/security/cve/CVE-2023-3446
https://bugzilla.redhat.com/2224962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446
https://errata.almalinux.org/8/ALSA-2024-0888.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23
https://linux.oracle.com/cve/CVE-2023-3446.html
https://linux.oracle.com/errata/ELSA-2024-12056.html
https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3446
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230803-0011/
https://ubuntu.com/security/notices/USN-6435-1
https://ubuntu.com/security/notices/USN-6435-2
https://ubuntu.com/security/notices/USN-6450-1
https://www.cve.org/CVERecord?id=CVE-2023-3446
https://www.openssl.org/news/secadv/20230719.txt
|
| openssl |
CVE-2023-3817 |
LOW |
1:1.0.2k-26.el7_9 |
|
http://seclists.org/fulldisclosure/2023/Jul/43
http://www.openwall.com/lists/oss-security/2023/07/31/1
http://www.openwall.com/lists/oss-security/2023/09/22/11
http://www.openwall.com/lists/oss-security/2023/09/22/9
http://www.openwall.com/lists/oss-security/2023/11/06/2
https://access.redhat.com/errata/RHSA-2023:7877
https://access.redhat.com/security/cve/CVE-2023-3817
https://bugzilla.redhat.com/2224962
https://bugzilla.redhat.com/2227852
https://bugzilla.redhat.com/2248616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3817
https://errata.almalinux.org/8/ALSA-2023-7877.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5
https://linux.oracle.com/cve/CVE-2023-3817.html
https://linux.oracle.com/errata/ELSA-2024-12056.html
https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3817
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230818-0014/
https://security.netapp.com/advisory/ntap-20231027-0008/
https://ubuntu.com/security/notices/USN-6435-1
https://ubuntu.com/security/notices/USN-6435-2
https://ubuntu.com/security/notices/USN-6450-1
https://www.cve.org/CVERecord?id=CVE-2023-3817
https://www.openssl.org/news/secadv/20230731.txt
|
| openssl |
CVE-2023-5678 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:7877
https://access.redhat.com/security/cve/CVE-2023-5678
https://bugzilla.redhat.com/2224962
https://bugzilla.redhat.com/2227852
https://bugzilla.redhat.com/2248616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5678
https://errata.almalinux.org/8/ALSA-2023-7877.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6
https://linux.oracle.com/cve/CVE-2023-5678.html
https://linux.oracle.com/errata/ELSA-2024-12056.html
https://nvd.nist.gov/vuln/detail/CVE-2023-5678
https://security.netapp.com/advisory/ntap-20231130-0010/
https://ubuntu.com/security/notices/USN-6622-1
https://ubuntu.com/security/notices/USN-6632-1
https://www.cve.org/CVERecord?id=CVE-2023-5678
https://www.openssl.org/news/secadv/20231106.txt
|
| openssl |
CVE-2023-6129 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-6129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6129
https://github.com/openssl/openssl/commit/050d26383d4e264966fb83428e72d5d48f402d35
https://github.com/openssl/openssl/commit/5b139f95c9a47a55a0c54100f3837b1eee942b04
https://github.com/openssl/openssl/commit/f3fc5808fe9ff74042d639839610d03b8fdcc015
https://nvd.nist.gov/vuln/detail/CVE-2023-6129
https://security.netapp.com/advisory/ntap-20240216-0009/
https://ubuntu.com/security/notices/USN-6622-1
https://www.cve.org/CVERecord?id=CVE-2023-6129
https://www.openssl.org/news/secadv/20240109.txt
https://www.openwall.com/lists/oss-security/2024/01/09/1
|
| openssl |
CVE-2024-0727 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2024-0727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0727
https://github.com/alexcrichton/openssl-src-rs/commit/add20f73b6b42be7451af2e1044d4e0e778992b2
https://github.com/github/advisory-database/pull/3472
https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2
https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a
https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c
https://github.com/openssl/openssl/pull/23362
https://github.com/pyca/cryptography/commit/3519591d255d4506fbcd0d04037d45271903c64d
https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8
https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539
https://nvd.nist.gov/vuln/detail/CVE-2024-0727
https://security.netapp.com/advisory/ntap-20240208-0006
https://security.netapp.com/advisory/ntap-20240208-0006/
https://ubuntu.com/security/notices/USN-6622-1
https://ubuntu.com/security/notices/USN-6632-1
https://www.cve.org/CVERecord?id=CVE-2024-0727
https://www.openssl.org/news/secadv/20240125.txt
|
| openssl-libs |
CVE-2015-2808 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html
http://marc.info/?l=bugtraq&m=143456209711959&w=2
http://marc.info/?l=bugtraq&m=143629696317098&w=2
http://marc.info/?l=bugtraq&m=143741441012338&w=2
http://marc.info/?l=bugtraq&m=143817021313142&w=2
http://marc.info/?l=bugtraq&m=143817899717054&w=2
http://marc.info/?l=bugtraq&m=143818140118771&w=2
http://marc.info/?l=bugtraq&m=144043644216842&w=2
http://marc.info/?l=bugtraq&m=144059660127919&w=2
http://marc.info/?l=bugtraq&m=144059703728085&w=2
http://marc.info/?l=bugtraq&m=144060576831314&w=2
http://marc.info/?l=bugtraq&m=144060606031437&w=2
http://marc.info/?l=bugtraq&m=144069189622016&w=2
http://marc.info/?l=bugtraq&m=144102017024820&w=2
http://marc.info/?l=bugtraq&m=144104533800819&w=2
http://marc.info/?l=bugtraq&m=144104565600964&w=2
http://marc.info/?l=bugtraq&m=144493176821532&w=2
http://rhn.redhat.com/errata/RHSA-2015-1006.html
http://rhn.redhat.com/errata/RHSA-2015-1007.html
http://rhn.redhat.com/errata/RHSA-2015-1020.html
http://rhn.redhat.com/errata/RHSA-2015-1021.html
http://rhn.redhat.com/errata/RHSA-2015-1091.html
http://rhn.redhat.com/errata/RHSA-2015-1228.html
http://rhn.redhat.com/errata/RHSA-2015-1229.html
http://rhn.redhat.com/errata/RHSA-2015-1230.html
http://rhn.redhat.com/errata/RHSA-2015-1241.html
http://rhn.redhat.com/errata/RHSA-2015-1242.html
http://rhn.redhat.com/errata/RHSA-2015-1243.html
http://rhn.redhat.com/errata/RHSA-2015-1526.html
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888
http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892
http://www-01.ibm.com/support/docview.wss?uid=swg21883640
http://www-304.ibm.com/support/docview.wss?uid=swg21903565
http://www-304.ibm.com/support/docview.wss?uid=swg21960015
http://www-304.ibm.com/support/docview.wss?uid=swg21960769
http://www.debian.org/security/2015/dsa-3316
http://www.debian.org/security/2015/dsa-3339
http://www.huawei.com/en/psirt/security-advisories/hw-454055
http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/73684
http://www.securityfocus.com/bid/91787
http://www.securitytracker.com/id/1032599
http://www.securitytracker.com/id/1032600
http://www.securitytracker.com/id/1032707
http://www.securitytracker.com/id/1032708
http://www.securitytracker.com/id/1032734
http://www.securitytracker.com/id/1032788
http://www.securitytracker.com/id/1032858
http://www.securitytracker.com/id/1032868
http://www.securitytracker.com/id/1032910
http://www.securitytracker.com/id/1032990
http://www.securitytracker.com/id/1033071
http://www.securitytracker.com/id/1033072
http://www.securitytracker.com/id/1033386
http://www.securitytracker.com/id/1033415
http://www.securitytracker.com/id/1033431
http://www.securitytracker.com/id/1033432
http://www.securitytracker.com/id/1033737
http://www.securitytracker.com/id/1033769
http://www.securitytracker.com/id/1036222
http://www.ubuntu.com/usn/USN-2696-1
http://www.ubuntu.com/usn/USN-2706-1
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm
https://access.redhat.com/security/cve/CVE-2015-2808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650
https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888
https://kb.juniper.net/JSA10783
https://kc.mcafee.com/corporate/index?page=content&id=SB10163
https://linux.oracle.com/cve/CVE-2015-2808.html
https://linux.oracle.com/errata/ELSA-2015-1526.html
https://nvd.nist.gov/vuln/detail/CVE-2015-2808
https://security.gentoo.org/glsa/201512-10
https://ubuntu.com/security/notices/USN-2696-1
https://ubuntu.com/security/notices/USN-2706-1
https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
https://www.cve.org/CVERecord?id=CVE-2015-2808
https://www.secpod.com/blog/cve-2015-2808-bar-mitzvah-attack-in-rc4-2/
|
| openssl-libs |
CVE-2019-1547 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1547
https://arxiv.org/abs/1909.01785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=21c856b75d81eff61aa63b4f036bb64a85bf6d46
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30c22fa8b1d840036b8e203585738df62a03cec8
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1547.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://nvd.nist.gov/vuln/detail/CVE-2019-1547
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://security.netapp.com/advisory/ntap-20200122-0002/
https://security.netapp.com/advisory/ntap-20200416-0003/
https://support.f5.com/csp/article/K73422160?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.cve.org/CVERecord?id=CVE-2019-1547
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-08
https://www.tenable.com/security/tns-2019-09
|
| openssl-libs |
CVE-2022-1292 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2022:6224
https://access.redhat.com/security/cve/CVE-2022-1292
https://bugzilla.redhat.com/2081494
https://bugzilla.redhat.com/2087911
https://bugzilla.redhat.com/2087913
https://bugzilla.redhat.com/2097310
https://bugzilla.redhat.com/2104905
https://bugzilla.redhat.com/show_bug.cgi?id=2081494
https://bugzilla.redhat.com/show_bug.cgi?id=2097310
https://bugzilla.redhat.com/show_bug.cgi?id=2100554
https://bugzilla.redhat.com/show_bug.cgi?id=2104905
https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097
https://errata.almalinux.org/9/ALSA-2022-6224.html
https://errata.rockylinux.org/RLSA-2022:5818
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23
https://linux.oracle.com/cve/CVE-2022-1292.html
https://linux.oracle.com/errata/ELSA-2022-9751.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD/
https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0011
https://security.gentoo.org/glsa/202210-02
https://security.netapp.com/advisory/ntap-20220602-0009/
https://security.netapp.com/advisory/ntap-20220729-0004/
https://ubuntu.com/security/notices/USN-5402-1
https://ubuntu.com/security/notices/USN-5402-2
https://ubuntu.com/security/notices/USN-6457-1
https://www.cve.org/CVERecord?id=CVE-2022-1292
https://www.debian.org/security/2022/dsa-5139
https://www.openssl.org/news/secadv/20220503.txt
https://www.oracle.com/security-alerts/cpujul2022.html
|
| openssl-libs |
CVE-2022-2068 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2022:6224
https://access.redhat.com/security/cve/CVE-2022-2068
https://bugzilla.redhat.com/2081494
https://bugzilla.redhat.com/2087911
https://bugzilla.redhat.com/2087913
https://bugzilla.redhat.com/2097310
https://bugzilla.redhat.com/2104905
https://bugzilla.redhat.com/show_bug.cgi?id=2081494
https://bugzilla.redhat.com/show_bug.cgi?id=2097310
https://bugzilla.redhat.com/show_bug.cgi?id=2100554
https://bugzilla.redhat.com/show_bug.cgi?id=2104905
https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097
https://errata.almalinux.org/9/ALSA-2022-6224.html
https://errata.rockylinux.org/RLSA-2022:5818
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9639817dac8bbbaa64d09efad7464ccc405527c7
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7
https://linux.oracle.com/cve/CVE-2022-2068.html
https://linux.oracle.com/errata/ELSA-2022-9751.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WZZBKUHQFGSKGNXXKICSRPL7AMVW5M5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/
https://nvd.nist.gov/vuln/detail/CVE-2022-2068
https://security.netapp.com/advisory/ntap-20220707-0008/
https://ubuntu.com/security/notices/USN-5488-1
https://ubuntu.com/security/notices/USN-5488-2
https://ubuntu.com/security/notices/USN-6457-1
https://www.cve.org/CVERecord?id=CVE-2022-2068
https://www.debian.org/security/2022/dsa-5169
https://www.openssl.org/news/secadv/20220621.txt
|
| openssl-libs |
CVE-2022-4304 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:2165
https://access.redhat.com/security/cve/CVE-2022-4304
https://bugzilla.redhat.com/1960321
https://bugzilla.redhat.com/2164440
https://bugzilla.redhat.com/2164487
https://bugzilla.redhat.com/2164492
https://bugzilla.redhat.com/2164494
https://bugzilla.redhat.com/show_bug.cgi?id=2144000
https://bugzilla.redhat.com/show_bug.cgi?id=2144003
https://bugzilla.redhat.com/show_bug.cgi?id=2144006
https://bugzilla.redhat.com/show_bug.cgi?id=2144008
https://bugzilla.redhat.com/show_bug.cgi?id=2144010
https://bugzilla.redhat.com/show_bug.cgi?id=2144012
https://bugzilla.redhat.com/show_bug.cgi?id=2144015
https://bugzilla.redhat.com/show_bug.cgi?id=2144017
https://bugzilla.redhat.com/show_bug.cgi?id=2144019
https://bugzilla.redhat.com/show_bug.cgi?id=2145170
https://bugzilla.redhat.com/show_bug.cgi?id=2158412
https://bugzilla.redhat.com/show_bug.cgi?id=2164440
https://bugzilla.redhat.com/show_bug.cgi?id=2164487
https://bugzilla.redhat.com/show_bug.cgi?id=2164488
https://bugzilla.redhat.com/show_bug.cgi?id=2164492
https://bugzilla.redhat.com/show_bug.cgi?id=2164494
https://bugzilla.redhat.com/show_bug.cgi?id=2164497
https://bugzilla.redhat.com/show_bug.cgi?id=2164499
https://bugzilla.redhat.com/show_bug.cgi?id=2164500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0401
https://errata.almalinux.org/9/ALSA-2023-2165.html
https://errata.rockylinux.org/RLSA-2023:0946
https://linux.oracle.com/cve/CVE-2022-4304.html
https://linux.oracle.com/errata/ELSA-2023-32791.html
https://nvd.nist.gov/vuln/detail/CVE-2022-4304
https://rustsec.org/advisories/RUSTSEC-2023-0007.html
https://security.gentoo.org/glsa/202402-08
https://ubuntu.com/security/notices/USN-5844-1
https://ubuntu.com/security/notices/USN-6564-1
https://www.cve.org/CVERecord?id=CVE-2022-4304
https://www.openssl.org/news/secadv/20230207.txt
|
| openssl-libs |
CVE-2023-0215 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:2165
https://access.redhat.com/security/cve/CVE-2023-0215
https://bugzilla.redhat.com/1960321
https://bugzilla.redhat.com/2164440
https://bugzilla.redhat.com/2164487
https://bugzilla.redhat.com/2164492
https://bugzilla.redhat.com/2164494
https://bugzilla.redhat.com/show_bug.cgi?id=2144000
https://bugzilla.redhat.com/show_bug.cgi?id=2144003
https://bugzilla.redhat.com/show_bug.cgi?id=2144006
https://bugzilla.redhat.com/show_bug.cgi?id=2144008
https://bugzilla.redhat.com/show_bug.cgi?id=2144010
https://bugzilla.redhat.com/show_bug.cgi?id=2144012
https://bugzilla.redhat.com/show_bug.cgi?id=2144015
https://bugzilla.redhat.com/show_bug.cgi?id=2144017
https://bugzilla.redhat.com/show_bug.cgi?id=2144019
https://bugzilla.redhat.com/show_bug.cgi?id=2145170
https://bugzilla.redhat.com/show_bug.cgi?id=2158412
https://bugzilla.redhat.com/show_bug.cgi?id=2164440
https://bugzilla.redhat.com/show_bug.cgi?id=2164487
https://bugzilla.redhat.com/show_bug.cgi?id=2164488
https://bugzilla.redhat.com/show_bug.cgi?id=2164492
https://bugzilla.redhat.com/show_bug.cgi?id=2164494
https://bugzilla.redhat.com/show_bug.cgi?id=2164497
https://bugzilla.redhat.com/show_bug.cgi?id=2164499
https://bugzilla.redhat.com/show_bug.cgi?id=2164500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4203
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0216
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0217
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0401
https://errata.almalinux.org/9/ALSA-2023-2165.html
https://errata.rockylinux.org/RLSA-2023:0946
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8818064ce3c3c0f1b740a5aaba2a987e75bfbafd
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9816136fe31d92ace4037d5da5257f763aeeb4eb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c3829dd8825c654652201e16f8a0a0c46ee3f344
https://linux.oracle.com/cve/CVE-2023-0215.html
https://linux.oracle.com/errata/ELSA-2023-32791.html
https://nvd.nist.gov/vuln/detail/CVE-2023-0215
https://rustsec.org/advisories/RUSTSEC-2023-0009.html
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230427-0007
https://security.netapp.com/advisory/ntap-20230427-0007/
https://security.netapp.com/advisory/ntap-20230427-0009
https://security.netapp.com/advisory/ntap-20230427-0009/
https://ubuntu.com/security/notices/USN-5844-1
https://ubuntu.com/security/notices/USN-5845-1
https://ubuntu.com/security/notices/USN-5845-2
https://ubuntu.com/security/notices/USN-6564-1
https://www.cve.org/CVERecord?id=CVE-2023-0215
https://www.openssl.org/news/secadv/20230207.txt
|
| openssl-libs |
CVE-2023-2650 |
MEDIUM |
1:1.0.2k-26.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/05/30/1
https://access.redhat.com/errata/RHSA-2023:6330
https://access.redhat.com/security/cve/CVE-2023-2650
https://bugzilla.redhat.com/1858038
https://bugzilla.redhat.com/2207947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650
https://errata.almalinux.org/9/ALSA-2023-6330.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=423a2bc737a908ad0c77bda470b2b59dc879936b
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=853c5e56ee0b8650c73140816bb8b91d6163422c
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9e209944b35cf82368071f160a744b6178f9b098
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db779b0e10b047f2585615e0b8f2acdf21f8544a
https://linux.oracle.com/cve/CVE-2023-2650.html
https://linux.oracle.com/errata/ELSA-2023-6330.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2023-2650
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0009
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230703-0001/
https://security.netapp.com/advisory/ntap-20231027-0009/
https://ubuntu.com/security/notices/USN-6119-1
https://ubuntu.com/security/notices/USN-6188-1
https://ubuntu.com/security/notices/USN-6672-1
https://www.cve.org/CVERecord?id=CVE-2023-2650
https://www.debian.org/security/2023/dsa-5417
https://www.openssl.org/news/secadv/20230530.txt
|
| openssl-libs |
CVE-2019-1551 |
LOW |
1:1.0.2k-26.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html
http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=419102400a2811582a7a3d4a4e317d72e5ce0a8f
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f1c5eea8a817075d31e43f5876993c6710238c98
https://github.com/openssl/openssl/pull/10575
https://linux.oracle.com/cve/CVE-2019-1551.html
https://linux.oracle.com/errata/ELSA-2020-4514.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/
https://nvd.nist.gov/vuln/detail/CVE-2019-1551
https://seclists.org/bugtraq/2019/Dec/39
https://seclists.org/bugtraq/2019/Dec/46
https://security.gentoo.org/glsa/202004-10
https://security.netapp.com/advisory/ntap-20191210-0001/
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4504-1/
https://www.cve.org/CVERecord?id=CVE-2019-1551
https://www.debian.org/security/2019/dsa-4594
https://www.debian.org/security/2021/dsa-4855
https://www.openssl.org/news/secadv/20191206.txt
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.tenable.com/security/tns-2019-09
https://www.tenable.com/security/tns-2020-03
https://www.tenable.com/security/tns-2020-11
https://www.tenable.com/security/tns-2021-10
|
| openssl-libs |
CVE-2019-1563 |
LOW |
1:1.0.2k-26.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html
http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html
https://access.redhat.com/security/cve/CVE-2019-1563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=08229ad838c50f644d7e928e2eef147b4308ad64
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=631f94db0065c78181ca9ba5546ebc8bb3884b97
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-1563.html
https://linux.oracle.com/errata/ELSA-2020-1840.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/
https://nvd.nist.gov/vuln/detail/CVE-2019-1563
https://seclists.org/bugtraq/2019/Oct/0
https://seclists.org/bugtraq/2019/Oct/1
https://seclists.org/bugtraq/2019/Sep/25
https://security.gentoo.org/glsa/201911-04
https://security.netapp.com/advisory/ntap-20190919-0002/
https://support.f5.com/csp/article/K97324400?utm_source=f5support&%3Butm_medium=RSS
https://ubuntu.com/security/notices/USN-4376-1
https://ubuntu.com/security/notices/USN-4376-2
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4376-1/
https://usn.ubuntu.com/4376-2/
https://usn.ubuntu.com/4504-1/
https://www.cve.org/CVERecord?id=CVE-2019-1563
https://www.debian.org/security/2019/dsa-4539
https://www.debian.org/security/2019/dsa-4540
https://www.openssl.org/news/secadv/20190910.txt
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.tenable.com/security/tns-2019-09
|
| openssl-libs |
CVE-2020-1968 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968
https://lists.debian.org/debian-lts-announce/2020/09/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1968
https://raccoon-attack.com/RacoonAttack.pdf
https://security.gentoo.org/glsa/202210-02
https://security.netapp.com/advisory/ntap-20200911-0004/
https://ubuntu.com/security/notices/USN-4504-1
https://usn.ubuntu.com/4504-1/
https://www.cve.org/CVERecord?id=CVE-2020-1968
https://www.openssl.org/news/secadv/20200909.txt
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| openssl-libs |
CVE-2021-3601 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-3601
https://nvd.nist.gov/vuln/detail/CVE-2021-3601
https://www.cve.org/CVERecord?id=CVE-2021-3601
|
| openssl-libs |
CVE-2022-3358 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:2523
https://access.redhat.com/security/cve/CVE-2022-3358
https://bugzilla.redhat.com/2134740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3358
https://errata.almalinux.org/9/ALSA-2023-2523.html
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b
https://github.com/alexcrichton/openssl-src-rs
https://linux.oracle.com/cve/CVE-2022-3358.html
https://linux.oracle.com/errata/ELSA-2023-2523.html
https://nvd.nist.gov/vuln/detail/CVE-2022-3358
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0023
https://rustsec.org/advisories/RUSTSEC-2022-0059.html
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20221028-0014
https://security.netapp.com/advisory/ntap-20221028-0014/
https://ubuntu.com/security/notices/USN-5710-1
https://www.cve.org/CVERecord?id=CVE-2022-3358
https://www.openssl.org/news/secadv/20221011.txt
|
| openssl-libs |
CVE-2023-0464 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:3722
https://access.redhat.com/security/cve/CVE-2023-0464
https://bugzilla.redhat.com/2181082
https://bugzilla.redhat.com/2182561
https://bugzilla.redhat.com/2182565
https://bugzilla.redhat.com/2188461
https://bugzilla.redhat.com/2207947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464
https://errata.almalinux.org/9/ALSA-2023-3722.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2dcd4f1e3115f38cefa43e3efbe9b801c27e642e
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=879f7080d7e141f415c79eaa3a8ac4a3dad0348b
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1
https://linux.oracle.com/cve/CVE-2023-0464.html
https://linux.oracle.com/errata/ELSA-2023-3722.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2023-0464
https://security.gentoo.org/glsa/202402-08
https://ubuntu.com/security/notices/USN-6039-1
https://www.couchbase.com/alerts/
https://www.cve.org/CVERecord?id=CVE-2023-0464
https://www.debian.org/security/2023/dsa-5417
https://www.openssl.org/news/secadv/20230322.txt
|
| openssl-libs |
CVE-2023-0465 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:3722
https://access.redhat.com/security/cve/CVE-2023-0465
https://bugzilla.redhat.com/2181082
https://bugzilla.redhat.com/2182561
https://bugzilla.redhat.com/2182565
https://bugzilla.redhat.com/2188461
https://bugzilla.redhat.com/2207947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465
https://errata.almalinux.org/9/ALSA-2023-3722.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b013765abfa80036dc779dd0e50602c57bb3bf95
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=facfb1ab745646e97a1920977ae4a9965ea61d5c
https://linux.oracle.com/cve/CVE-2023-0465.html
https://linux.oracle.com/errata/ELSA-2023-3722.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2023-0465
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230414-0001/
https://ubuntu.com/security/notices/USN-6039-1
https://www.cve.org/CVERecord?id=CVE-2023-0465
https://www.debian.org/security/2023/dsa-5417
https://www.openssl.org/news/secadv/20230328.txt
|
| openssl-libs |
CVE-2023-0466 |
LOW |
1:1.0.2k-26.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/09/28/4
https://access.redhat.com/errata/RHSA-2023:3722
https://access.redhat.com/security/cve/CVE-2023-0466
https://bugzilla.redhat.com/2181082
https://bugzilla.redhat.com/2182561
https://bugzilla.redhat.com/2182565
https://bugzilla.redhat.com/2188461
https://bugzilla.redhat.com/2207947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0466
https://errata.almalinux.org/9/ALSA-2023-3722.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0d16b7e99aafc0b4a6d729eec65a411a7e025f0a
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=73398dea26de9899fb4baa94098ad0a61f435c72
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc814a30fc4f0bc54fcea7d9a7462f5457aab061
https://linux.oracle.com/cve/CVE-2023-0466.html
https://linux.oracle.com/errata/ELSA-2023-3722.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
https://nvd.nist.gov/vuln/detail/CVE-2023-0466
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230414-0001/
https://ubuntu.com/security/notices/USN-6039-1
https://www.cve.org/CVERecord?id=CVE-2023-0466
https://www.debian.org/security/2023/dsa-5417
https://www.openssl.org/news/secadv/20230328.txt
|
| openssl-libs |
CVE-2023-3446 |
LOW |
1:1.0.2k-26.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/07/19/4
http://www.openwall.com/lists/oss-security/2023/07/19/5
http://www.openwall.com/lists/oss-security/2023/07/19/6
http://www.openwall.com/lists/oss-security/2023/07/31/1
https://access.redhat.com/errata/RHSA-2024:0888
https://access.redhat.com/security/cve/CVE-2023-3446
https://bugzilla.redhat.com/2224962
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446
https://errata.almalinux.org/8/ALSA-2024-0888.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23
https://linux.oracle.com/cve/CVE-2023-3446.html
https://linux.oracle.com/errata/ELSA-2024-12056.html
https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3446
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230803-0011/
https://ubuntu.com/security/notices/USN-6435-1
https://ubuntu.com/security/notices/USN-6435-2
https://ubuntu.com/security/notices/USN-6450-1
https://www.cve.org/CVERecord?id=CVE-2023-3446
https://www.openssl.org/news/secadv/20230719.txt
|
| openssl-libs |
CVE-2023-3817 |
LOW |
1:1.0.2k-26.el7_9 |
|
http://seclists.org/fulldisclosure/2023/Jul/43
http://www.openwall.com/lists/oss-security/2023/07/31/1
http://www.openwall.com/lists/oss-security/2023/09/22/11
http://www.openwall.com/lists/oss-security/2023/09/22/9
http://www.openwall.com/lists/oss-security/2023/11/06/2
https://access.redhat.com/errata/RHSA-2023:7877
https://access.redhat.com/security/cve/CVE-2023-3817
https://bugzilla.redhat.com/2224962
https://bugzilla.redhat.com/2227852
https://bugzilla.redhat.com/2248616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3817
https://errata.almalinux.org/8/ALSA-2023-7877.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5
https://linux.oracle.com/cve/CVE-2023-3817.html
https://linux.oracle.com/errata/ELSA-2024-12056.html
https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html
https://nvd.nist.gov/vuln/detail/CVE-2023-3817
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230818-0014/
https://security.netapp.com/advisory/ntap-20231027-0008/
https://ubuntu.com/security/notices/USN-6435-1
https://ubuntu.com/security/notices/USN-6435-2
https://ubuntu.com/security/notices/USN-6450-1
https://www.cve.org/CVERecord?id=CVE-2023-3817
https://www.openssl.org/news/secadv/20230731.txt
|
| openssl-libs |
CVE-2023-5678 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:7877
https://access.redhat.com/security/cve/CVE-2023-5678
https://bugzilla.redhat.com/2224962
https://bugzilla.redhat.com/2227852
https://bugzilla.redhat.com/2248616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5678
https://errata.almalinux.org/8/ALSA-2023-7877.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6
https://linux.oracle.com/cve/CVE-2023-5678.html
https://linux.oracle.com/errata/ELSA-2024-12056.html
https://nvd.nist.gov/vuln/detail/CVE-2023-5678
https://security.netapp.com/advisory/ntap-20231130-0010/
https://ubuntu.com/security/notices/USN-6622-1
https://ubuntu.com/security/notices/USN-6632-1
https://www.cve.org/CVERecord?id=CVE-2023-5678
https://www.openssl.org/news/secadv/20231106.txt
|
| openssl-libs |
CVE-2023-6129 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-6129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6129
https://github.com/openssl/openssl/commit/050d26383d4e264966fb83428e72d5d48f402d35
https://github.com/openssl/openssl/commit/5b139f95c9a47a55a0c54100f3837b1eee942b04
https://github.com/openssl/openssl/commit/f3fc5808fe9ff74042d639839610d03b8fdcc015
https://nvd.nist.gov/vuln/detail/CVE-2023-6129
https://security.netapp.com/advisory/ntap-20240216-0009/
https://ubuntu.com/security/notices/USN-6622-1
https://www.cve.org/CVERecord?id=CVE-2023-6129
https://www.openssl.org/news/secadv/20240109.txt
https://www.openwall.com/lists/oss-security/2024/01/09/1
|
| openssl-libs |
CVE-2024-0727 |
LOW |
1:1.0.2k-26.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2024-0727
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0727
https://github.com/alexcrichton/openssl-src-rs/commit/add20f73b6b42be7451af2e1044d4e0e778992b2
https://github.com/github/advisory-database/pull/3472
https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2
https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a
https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c
https://github.com/openssl/openssl/pull/23362
https://github.com/pyca/cryptography/commit/3519591d255d4506fbcd0d04037d45271903c64d
https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8
https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539
https://nvd.nist.gov/vuln/detail/CVE-2024-0727
https://security.netapp.com/advisory/ntap-20240208-0006
https://security.netapp.com/advisory/ntap-20240208-0006/
https://ubuntu.com/security/notices/USN-6622-1
https://ubuntu.com/security/notices/USN-6632-1
https://www.cve.org/CVERecord?id=CVE-2024-0727
https://www.openssl.org/news/secadv/20240125.txt
|
| p11-kit |
CVE-2020-29361 |
MEDIUM |
0.23.5-3.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-29361
https://bugzilla.redhat.com/show_bug.cgi?id=1665172
https://bugzilla.redhat.com/show_bug.cgi?id=1890464
https://bugzilla.redhat.com/show_bug.cgi?id=1903588
https://bugzilla.redhat.com/show_bug.cgi?id=1903590
https://bugzilla.redhat.com/show_bug.cgi?id=1903592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29363
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://errata.rockylinux.org/RLSA-2021:1609
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2
https://linux.oracle.com/cve/CVE-2020-29361.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29361
https://ubuntu.com/security/notices/USN-4677-1
https://ubuntu.com/security/notices/USN-4677-2
https://www.cve.org/CVERecord?id=CVE-2020-29361
https://www.debian.org/security/2021/dsa-4822
|
| p11-kit |
CVE-2020-29362 |
MEDIUM |
0.23.5-3.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-29362
https://bugzilla.redhat.com/show_bug.cgi?id=1665172
https://bugzilla.redhat.com/show_bug.cgi?id=1890464
https://bugzilla.redhat.com/show_bug.cgi?id=1903588
https://bugzilla.redhat.com/show_bug.cgi?id=1903590
https://bugzilla.redhat.com/show_bug.cgi?id=1903592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29363
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://errata.rockylinux.org/RLSA-2021:1609
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc
https://linux.oracle.com/cve/CVE-2020-29362.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29362
https://ubuntu.com/security/notices/USN-4677-1
https://www.cve.org/CVERecord?id=CVE-2020-29362
https://www.debian.org/security/2021/dsa-4822
|
| p11-kit-devel |
CVE-2020-29361 |
MEDIUM |
0.23.5-3.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-29361
https://bugzilla.redhat.com/show_bug.cgi?id=1665172
https://bugzilla.redhat.com/show_bug.cgi?id=1890464
https://bugzilla.redhat.com/show_bug.cgi?id=1903588
https://bugzilla.redhat.com/show_bug.cgi?id=1903590
https://bugzilla.redhat.com/show_bug.cgi?id=1903592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29363
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://errata.rockylinux.org/RLSA-2021:1609
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2
https://linux.oracle.com/cve/CVE-2020-29361.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29361
https://ubuntu.com/security/notices/USN-4677-1
https://ubuntu.com/security/notices/USN-4677-2
https://www.cve.org/CVERecord?id=CVE-2020-29361
https://www.debian.org/security/2021/dsa-4822
|
| p11-kit-devel |
CVE-2020-29362 |
MEDIUM |
0.23.5-3.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-29362
https://bugzilla.redhat.com/show_bug.cgi?id=1665172
https://bugzilla.redhat.com/show_bug.cgi?id=1890464
https://bugzilla.redhat.com/show_bug.cgi?id=1903588
https://bugzilla.redhat.com/show_bug.cgi?id=1903590
https://bugzilla.redhat.com/show_bug.cgi?id=1903592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29363
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://errata.rockylinux.org/RLSA-2021:1609
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc
https://linux.oracle.com/cve/CVE-2020-29362.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29362
https://ubuntu.com/security/notices/USN-4677-1
https://www.cve.org/CVERecord?id=CVE-2020-29362
https://www.debian.org/security/2021/dsa-4822
|
| p11-kit-trust |
CVE-2020-29361 |
MEDIUM |
0.23.5-3.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-29361
https://bugzilla.redhat.com/show_bug.cgi?id=1665172
https://bugzilla.redhat.com/show_bug.cgi?id=1890464
https://bugzilla.redhat.com/show_bug.cgi?id=1903588
https://bugzilla.redhat.com/show_bug.cgi?id=1903590
https://bugzilla.redhat.com/show_bug.cgi?id=1903592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29363
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://errata.rockylinux.org/RLSA-2021:1609
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2
https://linux.oracle.com/cve/CVE-2020-29361.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29361
https://ubuntu.com/security/notices/USN-4677-1
https://ubuntu.com/security/notices/USN-4677-2
https://www.cve.org/CVERecord?id=CVE-2020-29361
https://www.debian.org/security/2021/dsa-4822
|
| p11-kit-trust |
CVE-2020-29362 |
MEDIUM |
0.23.5-3.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-29362
https://bugzilla.redhat.com/show_bug.cgi?id=1665172
https://bugzilla.redhat.com/show_bug.cgi?id=1890464
https://bugzilla.redhat.com/show_bug.cgi?id=1903588
https://bugzilla.redhat.com/show_bug.cgi?id=1903590
https://bugzilla.redhat.com/show_bug.cgi?id=1903592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29363
https://errata.almalinux.org/8/ALSA-2021-1609.html
https://errata.rockylinux.org/RLSA-2021:1609
https://github.com/p11-glue/p11-kit/releases
https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc
https://linux.oracle.com/cve/CVE-2020-29362.html
https://linux.oracle.com/errata/ELSA-2021-1609.html
https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html
https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html
https://nvd.nist.gov/vuln/detail/CVE-2020-29362
https://ubuntu.com/security/notices/USN-4677-1
https://www.cve.org/CVERecord?id=CVE-2020-29362
https://www.debian.org/security/2021/dsa-4822
|
| pam |
CVE-2024-22365 |
MEDIUM |
1.1.8-23.el7 |
|
http://www.openwall.com/lists/oss-security/2024/01/18/3
https://access.redhat.com/security/cve/CVE-2024-22365
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365
https://github.com/linux-pam/linux-pam
https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb
https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0
https://nvd.nist.gov/vuln/detail/CVE-2024-22365
https://ubuntu.com/security/notices/USN-6588-1
https://www.cve.org/CVERecord?id=CVE-2024-22365
https://www.openwall.com/lists/oss-security/2024/01/18/3
|
| patch |
CVE-2015-1196 |
MEDIUM |
2.7.1-12.el7_7 |
|
http://git.savannah.gnu.org/cgit/patch.git/commit/?id=4e9269a5fc1fe80a1095a92593dd85db871e1fd3
http://lists.opensuse.org/opensuse-updates/2015-02/msg00013.html
http://seclists.org/oss-sec/2015/q1/173
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.securityfocus.com/bid/72074
https://access.redhat.com/security/cve/CVE-2015-1196
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775227
https://bugzilla.redhat.com/show_bug.cgi?id=1182154
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196
https://exchange.xforce.ibmcloud.com/vulnerabilities/99967
https://nvd.nist.gov/vuln/detail/CVE-2015-1196
https://ubuntu.com/security/notices/USN-2651-1
https://www.cve.org/CVERecord?id=CVE-2015-1196
|
| patch |
CVE-2015-1395 |
MEDIUM |
2.7.1-12.el7_7 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154214.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148953.html
http://www.openwall.com/lists/oss-security/2015/01/27/28
http://www.securityfocus.com/bid/72846
http://www.ubuntu.com/usn/USN-2651-1
https://access.redhat.com/security/cve/CVE-2015-1395
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775873
https://bugzilla.redhat.com/show_bug.cgi?id=1184490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1395
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=17953b5893f7c9835f0dd2a704ba04e0371d2cbd
https://nvd.nist.gov/vuln/detail/CVE-2015-1395
https://savannah.gnu.org/bugs/?44059
https://ubuntu.com/security/notices/USN-2651-1
https://www.cve.org/CVERecord?id=CVE-2015-1395
|
| patch |
CVE-2019-13636 |
MEDIUM |
2.7.1-12.el7_7 |
|
http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
https://access.redhat.com/security/cve/CVE-2019-13636
https://bugzilla.redhat.com/show_bug.cgi?id=1732781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13636
https://errata.almalinux.org/8/ALSA-2020-1852.html
https://errata.rockylinux.org/RLSA-2020:1852
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
https://github.com/irsl/gnu-patch-vulnerabilities
https://linux.oracle.com/cve/CVE-2019-13636.html
https://linux.oracle.com/errata/ELSA-2020-1852.html
https://lists.debian.org/debian-lts-announce/2019/07/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVWWGISFWACROJJPVJJL4UBLVZ7LPOLT/
https://nvd.nist.gov/vuln/detail/CVE-2019-13636
https://seclists.org/bugtraq/2019/Aug/29
https://seclists.org/bugtraq/2019/Jul/54
https://security.gentoo.org/glsa/201908-22
https://security.netapp.com/advisory/ntap-20190828-0001/
https://ubuntu.com/security/notices/USN-4071-1
https://ubuntu.com/security/notices/USN-4071-2
https://usn.ubuntu.com/4071-1/
https://usn.ubuntu.com/4071-2/
https://www.cve.org/CVERecord?id=CVE-2019-13636
https://www.debian.org/security/2019/dsa-4489
|
| patch |
CVE-2014-9637 |
LOW |
2.7.1-12.el7_7 |
|
http://advisories.mageia.org/MGASA-2015-0068.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154214.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148953.html
http://www.openwall.com/lists/oss-security/2015/01/22/7
http://www.securityfocus.com/bid/72286
http://www.ubuntu.com/usn/USN-2651-1
https://access.redhat.com/security/cve/CVE-2014-9637
https://bugzilla.redhat.com/show_bug.cgi?id=1185262
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9637
https://git.savannah.gnu.org/cgit/patch.git/commit/?id=0c08d7a902c6fdd49b704623a12d8d672ef18944
https://nvd.nist.gov/vuln/detail/CVE-2014-9637
https://savannah.gnu.org/bugs/?44051
https://ubuntu.com/security/notices/USN-2651-1
https://www.cve.org/CVERecord?id=CVE-2014-9637
|
| patch |
CVE-2019-20633 |
LOW |
2.7.1-12.el7_7 |
|
https://access.redhat.com/security/cve/CVE-2019-20633
https://nvd.nist.gov/vuln/detail/CVE-2019-20633
https://savannah.gnu.org/bugs/index.php?56683
https://www.cve.org/CVERecord?id=CVE-2019-20633
|
| patch |
CVE-2021-45261 |
LOW |
2.7.1-12.el7_7 |
|
https://access.redhat.com/security/cve/CVE-2021-45261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261
https://nvd.nist.gov/vuln/detail/CVE-2021-45261
https://savannah.gnu.org/bugs/?61685
https://www.cve.org/CVERecord?id=CVE-2021-45261
|
| pcre |
CVE-2017-6004 |
MEDIUM |
8.32-17.el7 |
|
http://www.securityfocus.com/bid/96295
http://www.securitytracker.com/id/1037850
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-6004
https://bugs.exim.org/show_bug.cgi?id=2035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-6004
https://security.gentoo.org/glsa/201706-11
https://ubuntu.com/security/notices/USN-5665-1
https://vcs.pcre.org/pcre/code/trunk/pcre_jit_compile.c?r1=1676&r2=1680&view=patch
https://www.cve.org/CVERecord?id=CVE-2017-6004
|
| pcre |
CVE-2017-7186 |
MEDIUM |
8.32-17.el7 |
|
http://www.securityfocus.com/bid/97030
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7186
https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/
https://bugs.exim.org/show_bug.cgi?id=2052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186
https://nvd.nist.gov/vuln/detail/CVE-2017-7186
https://security.gentoo.org/glsa/201710-09
https://security.gentoo.org/glsa/201710-25
https://ubuntu.com/security/notices/USN-5665-1
https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date
https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date
https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date
https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date
https://www.cve.org/CVERecord?id=CVE-2017-7186
|
| pcre |
CVE-2015-8382 |
LOW |
8.32-17.el7 |
|
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=c351b47ce85a3a147cfa801fa9f0149ab4160834
http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup
http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510
http://www.openwall.com/lists/oss-security/2015/08/04/2
http://www.openwall.com/lists/oss-security/2015/08/04/3
http://www.openwall.com/lists/oss-security/2015/11/29/1
http://www.securityfocus.com/bid/76157
https://access.redhat.com/security/cve/CVE-2015-8382
https://bto.bluecoat.com/security-advisory/sa128
https://bugs.exim.org/show_bug.cgi?id=1537
https://bugzilla.redhat.com/show_bug.cgi?id=1187225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382
https://nvd.nist.gov/vuln/detail/CVE-2015-8382
https://ubuntu.com/security/notices/USN-2943-1
https://www.cve.org/CVERecord?id=CVE-2015-8382
|
| pcre |
CVE-2017-11164 |
LOW |
8.32-17.el7 |
|
http://openwall.com/lists/oss-security/2017/07/11/3
http://www.openwall.com/lists/oss-security/2023/04/11/1
http://www.openwall.com/lists/oss-security/2023/04/12/1
http://www.securityfocus.com/bid/99575
https://access.redhat.com/security/cve/CVE-2017-11164
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-11164
https://www.cve.org/CVERecord?id=CVE-2017-11164
|
| pcre |
CVE-2017-7244 |
LOW |
8.32-17.el7 |
|
http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7244
https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244
https://nvd.nist.gov/vuln/detail/CVE-2017-7244
https://security.gentoo.org/glsa/201710-25
https://www.cve.org/CVERecord?id=CVE-2017-7244
|
| pcre |
CVE-2017-7245 |
LOW |
8.32-17.el7 |
|
http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7245
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://nvd.nist.gov/vuln/detail/CVE-2017-7245
https://security.gentoo.org/glsa/201710-25
https://www.cve.org/CVERecord?id=CVE-2017-7245
|
| pcre |
CVE-2017-7246 |
LOW |
8.32-17.el7 |
|
http://www.securityfocus.com/bid/97067
https://access.redhat.com/errata/RHSA-2018:2486
https://access.redhat.com/security/cve/CVE-2017-7246
https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/
https://nvd.nist.gov/vuln/detail/CVE-2017-7246
https://security.gentoo.org/glsa/201710-25
https://www.cve.org/CVERecord?id=CVE-2017-7246
|
| pcre |
CVE-2020-14155 |
LOW |
8.32-17.el7 |
|
http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2021/Feb/14
https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/
https://access.redhat.com/security/cve/CVE-2020-14155
https://bugs.gentoo.org/717920
https://bugzilla.redhat.com/show_bug.cgi?id=1848436
https://bugzilla.redhat.com/show_bug.cgi?id=1848444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155
https://errata.almalinux.org/8/ALSA-2021-4373.html
https://errata.rockylinux.org/RLSA-2021:4373
https://linux.oracle.com/cve/CVE-2020-14155.html
https://linux.oracle.com/errata/ELSA-2021-4373.html
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2020-14155
https://security.netapp.com/advisory/ntap-20221028-0010/
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT212147
https://ubuntu.com/security/notices/USN-5425-1
https://www.cve.org/CVERecord?id=CVE-2020-14155
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.pcre.org/original/changelog.txt
|
| perl |
CVE-2015-8853 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://nvd.nist.gov/vuln/detail/CVE-2015-8853
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
https://www.cve.org/CVERecord?id=CVE-2015-8853
|
| perl |
CVE-2016-1238 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab
http://www.debian.org/security/2016/dsa-3628
http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html
http://www.securityfocus.com/bid/92136
http://www.securitytracker.com/id/1036440
https://access.redhat.com/security/cve/CVE-2016-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/
https://nvd.nist.gov/vuln/detail/CVE-2016-1238
https://rt.perl.org/Public/Bug/Display.html?id=127834
https://security.gentoo.org/glsa/201701-75
https://security.gentoo.org/glsa/201812-07
https://www.cve.org/CVERecord?id=CVE-2016-1238
|
| perl |
CVE-2016-2381 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://nvd.nist.gov/vuln/detail/CVE-2016-2381
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.cve.org/CVERecord?id=CVE-2016-2381
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl |
CVE-2016-6185 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://nvd.nist.gov/vuln/detail/CVE-2016-6185
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
https://www.cve.org/CVERecord?id=CVE-2016-6185
|
| perl |
CVE-2020-16156 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
https://nvd.nist.gov/vuln/detail/CVE-2020-16156
https://ubuntu.com/security/notices/USN-5689-1
https://ubuntu.com/security/notices/USN-5689-2
https://www.cve.org/CVERecord?id=CVE-2020-16156
|
| perl |
CVE-2023-31484 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:6539
https://access.redhat.com/security/cve/CVE-2023-31484
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2218667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484
https://errata.almalinux.org/9/ALSA-2023-6539.html
https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)
https://github.com/andk/cpanpm/pull/175
https://linux.oracle.com/cve/CVE-2023-31484.html
https://linux.oracle.com/errata/ELSA-2023-6539.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://metacpan.org/dist/CPAN/changes
https://nvd.nist.gov/vuln/detail/CVE-2023-31484
https://ubuntu.com/security/notices/USN-6112-1
https://ubuntu.com/security/notices/USN-6112-2
https://www.cve.org/CVERecord?id=CVE-2023-31484
https://www.openwall.com/lists/oss-security/2023/04/18/14
|
| perl |
CVE-2013-7422 |
LOW |
4:5.16.3-299.el7_9 |
|
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://nvd.nist.gov/vuln/detail/CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
https://www.cve.org/CVERecord?id=CVE-2013-7422
|
| perl-File-Path |
CVE-2017-6512 |
LOW |
2.09-2.el7 |
|
http://cpansearch.perl.org/src/JKEENAN/File-Path-2.13/Changes
http://security.cucumberlinux.com/security/details.php?id=153
http://www.debian.org/security/2017/dsa-3873
http://www.securityfocus.com/bid/99180
http://www.securitytracker.com/id/1038610
https://access.redhat.com/security/cve/CVE-2017-6512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512
https://nvd.nist.gov/vuln/detail/CVE-2017-6512
https://rt.cpan.org/Ticket/Display.html?id=121951
https://security.gentoo.org/glsa/201709-12
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
https://www.cve.org/CVERecord?id=CVE-2017-6512
|
| perl-HTTP-Tiny |
CVE-2023-31486 |
MEDIUM |
0.033-3.el7 |
|
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:6542
https://access.redhat.com/security/cve/CVE-2023-31486
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2228392
https://errata.almalinux.org/9/ALSA-2023-6542.html
https://github.com/chansen/p5-http-tiny/pull/153
https://hackeriet.github.io/cpan-http-tiny-overview/
https://linux.oracle.com/cve/CVE-2023-31486.html
https://linux.oracle.com/errata/ELSA-2023-7174.html
https://nvd.nist.gov/vuln/detail/CVE-2023-31486
https://www.cve.org/CVERecord?id=CVE-2023-31486
https://www.openwall.com/lists/oss-security/2023/04/18/14
https://www.openwall.com/lists/oss-security/2023/05/03/4
https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/
|
| perl-Pod-Escapes |
CVE-2015-8853 |
MEDIUM |
1:1.04-299.el7_9 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://nvd.nist.gov/vuln/detail/CVE-2015-8853
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
https://www.cve.org/CVERecord?id=CVE-2015-8853
|
| perl-Pod-Escapes |
CVE-2016-1238 |
MEDIUM |
1:1.04-299.el7_9 |
|
http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab
http://www.debian.org/security/2016/dsa-3628
http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html
http://www.securityfocus.com/bid/92136
http://www.securitytracker.com/id/1036440
https://access.redhat.com/security/cve/CVE-2016-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/
https://nvd.nist.gov/vuln/detail/CVE-2016-1238
https://rt.perl.org/Public/Bug/Display.html?id=127834
https://security.gentoo.org/glsa/201701-75
https://security.gentoo.org/glsa/201812-07
https://www.cve.org/CVERecord?id=CVE-2016-1238
|
| perl-Pod-Escapes |
CVE-2016-2381 |
MEDIUM |
1:1.04-299.el7_9 |
|
http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://nvd.nist.gov/vuln/detail/CVE-2016-2381
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.cve.org/CVERecord?id=CVE-2016-2381
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl-Pod-Escapes |
CVE-2016-6185 |
MEDIUM |
1:1.04-299.el7_9 |
|
http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://nvd.nist.gov/vuln/detail/CVE-2016-6185
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
https://www.cve.org/CVERecord?id=CVE-2016-6185
|
| perl-Pod-Escapes |
CVE-2020-16156 |
MEDIUM |
1:1.04-299.el7_9 |
|
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
https://nvd.nist.gov/vuln/detail/CVE-2020-16156
https://ubuntu.com/security/notices/USN-5689-1
https://ubuntu.com/security/notices/USN-5689-2
https://www.cve.org/CVERecord?id=CVE-2020-16156
|
| perl-Pod-Escapes |
CVE-2023-31484 |
MEDIUM |
1:1.04-299.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:6539
https://access.redhat.com/security/cve/CVE-2023-31484
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2218667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484
https://errata.almalinux.org/9/ALSA-2023-6539.html
https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)
https://github.com/andk/cpanpm/pull/175
https://linux.oracle.com/cve/CVE-2023-31484.html
https://linux.oracle.com/errata/ELSA-2023-6539.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://metacpan.org/dist/CPAN/changes
https://nvd.nist.gov/vuln/detail/CVE-2023-31484
https://ubuntu.com/security/notices/USN-6112-1
https://ubuntu.com/security/notices/USN-6112-2
https://www.cve.org/CVERecord?id=CVE-2023-31484
https://www.openwall.com/lists/oss-security/2023/04/18/14
|
| perl-Pod-Escapes |
CVE-2013-7422 |
LOW |
1:1.04-299.el7_9 |
|
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://nvd.nist.gov/vuln/detail/CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
https://www.cve.org/CVERecord?id=CVE-2013-7422
|
| perl-libs |
CVE-2015-8853 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://nvd.nist.gov/vuln/detail/CVE-2015-8853
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
https://www.cve.org/CVERecord?id=CVE-2015-8853
|
| perl-libs |
CVE-2016-1238 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab
http://www.debian.org/security/2016/dsa-3628
http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html
http://www.securityfocus.com/bid/92136
http://www.securitytracker.com/id/1036440
https://access.redhat.com/security/cve/CVE-2016-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/
https://nvd.nist.gov/vuln/detail/CVE-2016-1238
https://rt.perl.org/Public/Bug/Display.html?id=127834
https://security.gentoo.org/glsa/201701-75
https://security.gentoo.org/glsa/201812-07
https://www.cve.org/CVERecord?id=CVE-2016-1238
|
| perl-libs |
CVE-2016-2381 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://nvd.nist.gov/vuln/detail/CVE-2016-2381
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.cve.org/CVERecord?id=CVE-2016-2381
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl-libs |
CVE-2016-6185 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://nvd.nist.gov/vuln/detail/CVE-2016-6185
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
https://www.cve.org/CVERecord?id=CVE-2016-6185
|
| perl-libs |
CVE-2020-16156 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
https://nvd.nist.gov/vuln/detail/CVE-2020-16156
https://ubuntu.com/security/notices/USN-5689-1
https://ubuntu.com/security/notices/USN-5689-2
https://www.cve.org/CVERecord?id=CVE-2020-16156
|
| perl-libs |
CVE-2023-31484 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:6539
https://access.redhat.com/security/cve/CVE-2023-31484
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2218667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484
https://errata.almalinux.org/9/ALSA-2023-6539.html
https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)
https://github.com/andk/cpanpm/pull/175
https://linux.oracle.com/cve/CVE-2023-31484.html
https://linux.oracle.com/errata/ELSA-2023-6539.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://metacpan.org/dist/CPAN/changes
https://nvd.nist.gov/vuln/detail/CVE-2023-31484
https://ubuntu.com/security/notices/USN-6112-1
https://ubuntu.com/security/notices/USN-6112-2
https://www.cve.org/CVERecord?id=CVE-2023-31484
https://www.openwall.com/lists/oss-security/2023/04/18/14
|
| perl-libs |
CVE-2013-7422 |
LOW |
4:5.16.3-299.el7_9 |
|
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://nvd.nist.gov/vuln/detail/CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
https://www.cve.org/CVERecord?id=CVE-2013-7422
|
| perl-macros |
CVE-2015-8853 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html
http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5
http://www.openwall.com/lists/oss-security/2016/04/20/5
http://www.openwall.com/lists/oss-security/2016/04/20/7
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/86707
https://access.redhat.com/security/cve/CVE-2015-8853
https://bugzilla.redhat.com/show_bug.cgi?id=1329106
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://nvd.nist.gov/vuln/detail/CVE-2015-8853
https://rt.perl.org/Public/Bug/Display.html?id=123562
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
https://www.cve.org/CVERecord?id=CVE-2015-8853
|
| perl-macros |
CVE-2016-1238 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html
http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab
http://www.debian.org/security/2016/dsa-3628
http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html
http://www.securityfocus.com/bid/92136
http://www.securitytracker.com/id/1036440
https://access.redhat.com/security/cve/CVE-2016-1238
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/
https://nvd.nist.gov/vuln/detail/CVE-2016-1238
https://rt.perl.org/Public/Bug/Display.html?id=127834
https://security.gentoo.org/glsa/201701-75
https://security.gentoo.org/glsa/201812-07
https://www.cve.org/CVERecord?id=CVE-2016-1238
|
| perl-macros |
CVE-2016-2381 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html
http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076
http://www.debian.org/security/2016/dsa-3501
http://www.gossamer-threads.com/lists/perl/porters/326387
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/83802
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2016-2381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731
https://nvd.nist.gov/vuln/detail/CVE-2016-2381
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-2916-1
https://www.cve.org/CVERecord?id=CVE-2016-2381
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl-macros |
CVE-2016-6185 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7
http://www.debian.org/security/2016/dsa-3628
http://www.openwall.com/lists/oss-security/2016/07/07/1
http://www.openwall.com/lists/oss-security/2016/07/08/5
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91685
http://www.securitytracker.com/id/1036260
https://access.redhat.com/security/cve/CVE-2016-6185
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/
https://nvd.nist.gov/vuln/detail/CVE-2016-6185
https://rt.cpan.org/Public/Bug/Display.html?id=115808
https://security.gentoo.org/glsa/201701-75
https://ubuntu.com/security/notices/USN-3625-1
https://ubuntu.com/security/notices/USN-3625-2
https://usn.ubuntu.com/3625-1/
https://usn.ubuntu.com/3625-2/
https://www.cve.org/CVERecord?id=CVE-2016-6185
|
| perl-macros |
CVE-2020-16156 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html
https://access.redhat.com/security/cve/CVE-2020-16156
https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/
https://metacpan.org/pod/distribution/CPAN/scripts/cpan
https://nvd.nist.gov/vuln/detail/CVE-2020-16156
https://ubuntu.com/security/notices/USN-5689-1
https://ubuntu.com/security/notices/USN-5689-2
https://www.cve.org/CVERecord?id=CVE-2020-16156
|
| perl-macros |
CVE-2023-31484 |
MEDIUM |
4:5.16.3-299.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/04/29/1
http://www.openwall.com/lists/oss-security/2023/05/03/3
http://www.openwall.com/lists/oss-security/2023/05/03/5
http://www.openwall.com/lists/oss-security/2023/05/07/2
https://access.redhat.com/errata/RHSA-2023:6539
https://access.redhat.com/security/cve/CVE-2023-31484
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://bugzilla.redhat.com/2218667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484
https://errata.almalinux.org/9/ALSA-2023-6539.html
https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0 (2.35-TRIAL)
https://github.com/andk/cpanpm/pull/175
https://linux.oracle.com/cve/CVE-2023-31484.html
https://linux.oracle.com/errata/ELSA-2023-6539.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://metacpan.org/dist/CPAN/changes
https://nvd.nist.gov/vuln/detail/CVE-2023-31484
https://ubuntu.com/security/notices/USN-6112-1
https://ubuntu.com/security/notices/USN-6112-2
https://www.cve.org/CVERecord?id=CVE-2023-31484
https://www.openwall.com/lists/oss-security/2023/04/18/14
|
| perl-macros |
CVE-2013-7422 |
LOW |
4:5.16.3-299.el7_9 |
|
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06
http://www.securityfocus.com/bid/75704
http://www.ubuntu.com/usn/USN-2916-1
https://access.redhat.com/security/cve/CVE-2013-7422
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422
https://nvd.nist.gov/vuln/detail/CVE-2013-7422
https://security.gentoo.org/glsa/201507-11
https://support.apple.com/kb/HT205031
https://ubuntu.com/security/notices/USN-2916-1
https://www.cve.org/CVERecord?id=CVE-2013-7422
|
| procps-ng |
CVE-2018-1121 |
LOW |
3.3.10-28.el7 |
|
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1121
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121
https://nvd.nist.gov/vuln/detail/CVE-2018-1121
https://www.cve.org/CVERecord?id=CVE-2018-1121
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
| procps-ng |
CVE-2018-1123 |
LOW |
3.3.10-28.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1123
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1123
https://security.gentoo.org/glsa/201805-14
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-3
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-3/
https://www.cve.org/CVERecord?id=CVE-2018-1123
https://www.debian.org/security/2018/dsa-4208
https://www.exploit-db.com/exploits/44806/
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
| procps-ng |
CVE-2018-1125 |
LOW |
3.3.10-28.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html
http://seclists.org/oss-sec/2018/q2/122
http://www.securityfocus.com/bid/104214
https://access.redhat.com/security/cve/CVE-2018-1125
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125
https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1125
https://ubuntu.com/security/notices/USN-3658-1
https://ubuntu.com/security/notices/USN-3658-3
https://usn.ubuntu.com/3658-1/
https://usn.ubuntu.com/3658-3/
https://www.cve.org/CVERecord?id=CVE-2018-1125
https://www.debian.org/security/2018/dsa-4208
https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
| procps-ng |
CVE-2023-4016 |
LOW |
3.3.10-28.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6705
https://access.redhat.com/security/cve/CVE-2023-4016
https://bugzilla.redhat.com/2228494
https://bugzilla.redhat.com/show_bug.cgi?id=2228494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4016
https://errata.almalinux.org/9/ALSA-2023-6705.html
https://errata.rockylinux.org/RLSA-2023:7187
https://gitlab.com/procps-ng/procps
https://gitlab.com/procps-ng/procps/-/commit/2c933ecba3bb1d3041a5a7a53a7b4078a6003413
https://gitlab.com/procps-ng/procps/-/issues/297
https://linux.oracle.com/cve/CVE-2023-4016.html
https://linux.oracle.com/errata/ELSA-2023-7187.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUETRRT24OFGPYK6ACPM5VUGHNKH5CQ5/
https://nvd.nist.gov/vuln/detail/CVE-2023-4016
https://ubuntu.com/security/notices/USN-6477-1
https://www.cve.org/CVERecord?id=CVE-2023-4016
https://www.freelists.org/post/procps/ps-buffer-overflow-CVE-20234016
|
| python |
CVE-2007-4559 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://mail.python.org/pipermail/python-dev/2007-August/074290.html
http://mail.python.org/pipermail/python-dev/2007-August/074292.html
http://secunia.com/advisories/26623
http://www.vupen.com/english/advisories/2007/3022
https://access.redhat.com/errata/RHSA-2023:6694
https://access.redhat.com/security/cve/CVE-2007-4559
https://bugzilla.redhat.com/263261
https://bugzilla.redhat.com/show_bug.cgi?id=263261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4559
https://discuss.python.org/t/policies-for-tarfile-extractall-a-k-a-fixing-cve-2007-4559/23149/28
https://errata.almalinux.org/9/ALSA-2023-6694.html
https://linux.oracle.com/cve/CVE-2007-4559.html
https://linux.oracle.com/errata/ELSA-2023-7176.html
https://nvd.nist.gov/vuln/detail/CVE-2007-4559
https://peps.python.org/pep-0706/
https://security.gentoo.org/glsa/202309-06
https://www.cve.org/CVERecord?id=CVE-2007-4559
|
| python |
CVE-2013-1664 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
http://bugs.python.org/issue17239
http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
http://rhn.redhat.com/errata/RHSA-2013-0657.html
http://rhn.redhat.com/errata/RHSA-2013-0658.html
http://rhn.redhat.com/errata/RHSA-2013-0670.html
http://ubuntu.com/usn/usn-1757-1
http://www.openwall.com/lists/oss-security/2013/02/19/2
http://www.openwall.com/lists/oss-security/2013/02/19/4
https://access.redhat.com/security/cve/CVE-2013-1664
https://bugs.launchpad.net/nova/+bug/1100282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1664
https://nvd.nist.gov/vuln/detail/CVE-2013-1664
https://ubuntu.com/security/notices/USN-1730-1
https://ubuntu.com/security/notices/USN-1731-1
https://ubuntu.com/security/notices/USN-1734-1
https://ubuntu.com/security/notices/USN-1757-1
https://www.cve.org/CVERecord?id=CVE-2013-1664
https://www.djangoproject.com/weblog/2013/feb/19/security/
|
| python |
CVE-2013-1665 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
http://bugs.python.org/issue17239
http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
http://rhn.redhat.com/errata/RHSA-2013-0657.html
http://rhn.redhat.com/errata/RHSA-2013-0658.html
http://rhn.redhat.com/errata/RHSA-2013-0670.html
http://ubuntu.com/usn/usn-1757-1
http://www.debian.org/security/2013/dsa-2634
http://www.openwall.com/lists/oss-security/2013/02/19/2
http://www.openwall.com/lists/oss-security/2013/02/19/4
https://access.redhat.com/security/cve/CVE-2013-1665
https://bugs.launchpad.net/keystone/+bug/1100279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1665
https://nvd.nist.gov/vuln/detail/CVE-2013-1665
https://ubuntu.com/security/notices/USN-1730-1
https://ubuntu.com/security/notices/USN-1757-1
https://www.cve.org/CVERecord?id=CVE-2013-1665
https://www.djangoproject.com/weblog/2013/feb/19/security/
|
| python |
CVE-2013-7040 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://access.redhat.com/security/cve/CVE-2013-7040
https://nvd.nist.gov/vuln/detail/CVE-2013-7040
https://support.apple.com/kb/HT205031
https://www.cve.org/CVERecord?id=CVE-2013-7040
|
| python |
CVE-2017-1000158 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2017-1000158
https://security.gentoo.org/glsa/201805-02
https://security.netapp.com/advisory/ntap-20230216-0001/
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.cve.org/CVERecord?id=CVE-2017-1000158
https://www.debian.org/security/2018/dsa-4307
|
| python |
CVE-2019-18348 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-18348
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://nvd.nist.gov/vuln/detail/CVE-2019-18348
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.cve.org/CVERecord?id=CVE-2019-18348
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| python |
CVE-2020-10735 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://www.openwall.com/lists/oss-security/2022/09/21/1
http://www.openwall.com/lists/oss-security/2022/09/21/4
https://access.redhat.com/errata/RHSA-2022:7323
https://access.redhat.com/security/cve/CVE-2020-10735
https://bugzilla.redhat.com/1834423
https://bugzilla.redhat.com/show_bug.cgi?id=1834423
https://bugzilla.redhat.com/show_bug.cgi?id=2120642
https://bugzilla.redhat.com/show_bug.cgi?id=2144072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061
https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y
https://errata.almalinux.org/9/ALSA-2022-7323.html
https://errata.rockylinux.org/RLSA-2023:0833
https://github.com/python/cpython/issues/95778
https://linux.oracle.com/cve/CVE-2020-10735.html
https://linux.oracle.com/errata/ELSA-2023-2764.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/76YE7AM37MRU76XJV4M27CWDAMUGNRYK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NHC6IUU7CLRQ3QLPWUXLONSG3SXFTR47/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TD7JDDKJXK6D26XAN3YRFNM2LAJHT5UO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMWPRAAJS7I6U3U45V7GZVXWNSECI22M/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/
https://nvd.nist.gov/vuln/detail/CVE-2020-10735
https://www.cve.org/CVERecord?id=CVE-2020-10735
|
| python |
CVE-2020-27619 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-27619
https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://nvd.nist.gov/vuln/detail/CVE-2020-27619
https://security.gentoo.org/glsa/202402-04
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
https://www.cve.org/CVERecord?id=CVE-2020-27619
https://www.oracle.com/security-alerts/cpujul2022.html
|
| python |
CVE-2020-8492 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://access.redhat.com/security/cve/CVE-2020-8492
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://errata.almalinux.org/8/ALSA-2020-4641.html
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5%40%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da%40%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://nvd.nist.gov/vuln/detail/CVE-2020-8492
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.cve.org/CVERecord?id=CVE-2020-8492
|
| python |
CVE-2021-23336 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.cve.org/CVERecord?id=CVE-2021-23336
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| python |
CVE-2021-3733 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3733
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://www.cve.org/CVERecord?id=CVE-2021-3733
|
| python |
CVE-2021-4189 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://bugzilla.redhat.com/show_bug.cgi?id=2006792
https://bugzilla.redhat.com/show_bug.cgi?id=2032569
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://bugzilla.redhat.com/show_bug.cgi?id=2047376
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://errata.rockylinux.org/RLSA-2022:1821
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
https://nvd.nist.gov/vuln/detail/CVE-2021-4189
https://python-security.readthedocs.io/vuln/ftplib-pasv.html
https://security-tracker.debian.org/tracker/CVE-2021-4189
https://security.netapp.com/advisory/ntap-20221104-0004/
https://ubuntu.com/security/notices/USN-5342-1
https://ubuntu.com/security/notices/USN-5342-2
https://www.cve.org/CVERecord?id=CVE-2021-4189
|
| python |
CVE-2022-0391 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/errata/RHSA-2022:6457
https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://bugzilla.redhat.com/2047376
https://bugzilla.redhat.com/2075390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-6457.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2023-3550.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.gentoo.org/glsa/202305-02
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://ubuntu.com/security/notices/USN-5342-2
https://www.cve.org/CVERecord?id=CVE-2022-0391
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| python |
CVE-2022-45061 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:0953
https://access.redhat.com/security/cve/CVE-2022-45061
https://bugzilla.redhat.com/2144072
https://bugzilla.redhat.com/show_bug.cgi?id=2144072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061
https://errata.almalinux.org/9/ALSA-2023-0953.html
https://errata.rockylinux.org/RLSA-2023:0953
https://github.com/python/cpython/issues/98433
https://github.com/python/cpython/pull/99092
https://github.com/python/cpython/pull/99230 (3.9-branch)
https://github.com/python/cpython/pull/99231 (3.8-branch)
https://linux.oracle.com/cve/CVE-2022-45061.html
https://linux.oracle.com/errata/ELSA-2023-2860.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/
https://nvd.nist.gov/vuln/detail/CVE-2022-45061
https://python-security.readthedocs.io/vuln/slow-idna-large-strings.html
https://security.gentoo.org/glsa/202305-02
https://security.netapp.com/advisory/ntap-20221209-0007/
https://ubuntu.com/security/notices/USN-5767-1
https://ubuntu.com/security/notices/USN-5767-2
https://ubuntu.com/security/notices/USN-5888-1
https://www.cve.org/CVERecord?id=CVE-2022-45061
|
| python |
CVE-2022-48560 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0114
https://access.redhat.com/security/cve/CVE-2022-48560
https://bugs.python.org/issue39421
https://bugzilla.redhat.com/2249750
https://bugzilla.redhat.com/2249755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48560
https://errata.almalinux.org/8/ALSA-2024-0114.html
https://github.com/python/cpython/commit/79f89e6e5a659846d1068e8b1bd8e491ccdef861 (v3.9.0a3)
https://github.com/python/cpython/commit/958064f8d2b84062b0582bbae911df8ccfc11fd6 (v3.7.7rc1)
https://github.com/python/cpython/issues/83602
https://linux.oracle.com/cve/CVE-2022-48560.html
https://linux.oracle.com/errata/ELSA-2024-0114.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZ5OOBWNYWXFTZDMCGHJVGDLDTHLWITJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VO7Y2YZSDK3UYJD2KBGLXRTGNG6T326J/
https://nvd.nist.gov/vuln/detail/CVE-2022-48560
https://security.netapp.com/advisory/ntap-20230929-0008/
https://ubuntu.com/security/notices/USN-6394-1
https://ubuntu.com/security/notices/USN-6394-2
https://www.cve.org/CVERecord?id=CVE-2022-48560
|
| python |
CVE-2022-48565 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-48565
https://bugs.python.org/issue42051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48565
https://github.com/python/cpython/commit/05ee790f4d1cd8725a90b54268fc1dfe5b4d1fa2 (v3.10.0a2)
https://github.com/python/cpython/commit/479553c7c11306a09ce34edb6ef208133b7b95fe (3.9)
https://github.com/python/cpython/commit/e512bc799e3864fe3b1351757261762d63471efc (v3.7.10)
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BAYWJD576JUKLHCWKDLMJSUGTRDKPF3M/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA/
https://nvd.nist.gov/vuln/detail/CVE-2022-48565
https://security.netapp.com/advisory/ntap-20231006-0007/
https://ubuntu.com/security/notices/USN-6354-1
https://www.cve.org/CVERecord?id=CVE-2022-48565
|
| python |
CVE-2022-48566 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-48566
https://bugs.python.org/issue40791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48566
https://github.com/python/cpython/commit/8183e11d87388e4e44e3242c42085b87a878f781
https://github.com/python/cpython/issues/84968
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-48566
https://security.netapp.com/advisory/ntap-20231006-0013/
https://ubuntu.com/security/notices/USN-6400-1
https://www.cve.org/CVERecord?id=CVE-2022-48566
|
| python |
CVE-2023-27043 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://python.org
https://access.redhat.com/articles/7051467
https://access.redhat.com/errata/RHSA-2024:0466
https://access.redhat.com/security/cve/CVE-2023-27043
https://bugzilla.redhat.com/2196183
https://bugzilla.redhat.com/show_bug.cgi?id=2196183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043
https://errata.almalinux.org/9/ALSA-2024-0466.html
https://errata.rockylinux.org/RLSA-2024:0256
https://github.com/python/cpython/issues/102988
https://github.com/python/cpython/pull/102990
https://github.com/python/cpython/pull/105127
https://linux.oracle.com/cve/CVE-2023-27043.html
https://linux.oracle.com/errata/ELSA-2024-0466.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
https://nvd.nist.gov/vuln/detail/CVE-2023-27043
https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html
https://security.netapp.com/advisory/ntap-20230601-0003/
https://www.cve.org/CVERecord?id=CVE-2023-27043
|
| python |
CVE-2023-36632 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-36632
https://docs.python.org/3/library/email.html
https://docs.python.org/3/library/email.utils.html
https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-email.utils.parseaddr.py
https://github.com/python/cpython/issues/103800
https://nvd.nist.gov/vuln/detail/CVE-2023-36632
https://www.cve.org/CVERecord?id=CVE-2023-36632
|
| python |
CVE-2018-1000030 |
LOW |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://nvd.nist.gov/vuln/detail/CVE-2018-1000030
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.cve.org/CVERecord?id=CVE-2018-1000030
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
|
| python |
CVE-2019-9674 |
LOW |
2.7.5-94.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.cve.org/CVERecord?id=CVE-2019-9674
https://www.python.org/news/security/
|
| python |
CVE-2021-3737 |
LOW |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://bugzilla.redhat.com/show_bug.cgi?id=2006792
https://bugzilla.redhat.com/show_bug.cgi?id=2032569
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://bugzilla.redhat.com/show_bug.cgi?id=2047376
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://errata.rockylinux.org/RLSA-2022:1821
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
https://www.cve.org/CVERecord?id=CVE-2021-3737
https://www.oracle.com/security-alerts/cpujul2022.html
|
| python-libs |
CVE-2007-4559 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://mail.python.org/pipermail/python-dev/2007-August/074290.html
http://mail.python.org/pipermail/python-dev/2007-August/074292.html
http://secunia.com/advisories/26623
http://www.vupen.com/english/advisories/2007/3022
https://access.redhat.com/errata/RHSA-2023:6694
https://access.redhat.com/security/cve/CVE-2007-4559
https://bugzilla.redhat.com/263261
https://bugzilla.redhat.com/show_bug.cgi?id=263261
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4559
https://discuss.python.org/t/policies-for-tarfile-extractall-a-k-a-fixing-cve-2007-4559/23149/28
https://errata.almalinux.org/9/ALSA-2023-6694.html
https://linux.oracle.com/cve/CVE-2007-4559.html
https://linux.oracle.com/errata/ELSA-2023-7176.html
https://nvd.nist.gov/vuln/detail/CVE-2007-4559
https://peps.python.org/pep-0706/
https://security.gentoo.org/glsa/202309-06
https://www.cve.org/CVERecord?id=CVE-2007-4559
|
| python-libs |
CVE-2013-1664 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
http://bugs.python.org/issue17239
http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
http://rhn.redhat.com/errata/RHSA-2013-0657.html
http://rhn.redhat.com/errata/RHSA-2013-0658.html
http://rhn.redhat.com/errata/RHSA-2013-0670.html
http://ubuntu.com/usn/usn-1757-1
http://www.openwall.com/lists/oss-security/2013/02/19/2
http://www.openwall.com/lists/oss-security/2013/02/19/4
https://access.redhat.com/security/cve/CVE-2013-1664
https://bugs.launchpad.net/nova/+bug/1100282
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1664
https://nvd.nist.gov/vuln/detail/CVE-2013-1664
https://ubuntu.com/security/notices/USN-1730-1
https://ubuntu.com/security/notices/USN-1731-1
https://ubuntu.com/security/notices/USN-1734-1
https://ubuntu.com/security/notices/USN-1757-1
https://www.cve.org/CVERecord?id=CVE-2013-1664
https://www.djangoproject.com/weblog/2013/feb/19/security/
|
| python-libs |
CVE-2013-1665 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html
http://bugs.python.org/issue17239
http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html
http://rhn.redhat.com/errata/RHSA-2013-0657.html
http://rhn.redhat.com/errata/RHSA-2013-0658.html
http://rhn.redhat.com/errata/RHSA-2013-0670.html
http://ubuntu.com/usn/usn-1757-1
http://www.debian.org/security/2013/dsa-2634
http://www.openwall.com/lists/oss-security/2013/02/19/2
http://www.openwall.com/lists/oss-security/2013/02/19/4
https://access.redhat.com/security/cve/CVE-2013-1665
https://bugs.launchpad.net/keystone/+bug/1100279
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1665
https://nvd.nist.gov/vuln/detail/CVE-2013-1665
https://ubuntu.com/security/notices/USN-1730-1
https://ubuntu.com/security/notices/USN-1757-1
https://www.cve.org/CVERecord?id=CVE-2013-1665
https://www.djangoproject.com/weblog/2013/feb/19/security/
|
| python-libs |
CVE-2013-7040 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://bugs.python.org/issue14621
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://www.openwall.com/lists/oss-security/2013/12/09/13
http://www.openwall.com/lists/oss-security/2013/12/09/3
http://www.securityfocus.com/bid/64194
https://access.redhat.com/security/cve/CVE-2013-7040
https://nvd.nist.gov/vuln/detail/CVE-2013-7040
https://support.apple.com/kb/HT205031
https://www.cve.org/CVERecord?id=CVE-2013-7040
|
| python-libs |
CVE-2017-1000158 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html
http://www.securitytracker.com/id/1039890
https://access.redhat.com/security/cve/CVE-2017-1000158
https://bugs.python.org/issue30657
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158
https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae
https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html
https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html
https://nvd.nist.gov/vuln/detail/CVE-2017-1000158
https://security.gentoo.org/glsa/201805-02
https://security.netapp.com/advisory/ntap-20230216-0001/
https://ubuntu.com/security/notices/USN-3496-1
https://ubuntu.com/security/notices/USN-3496-2
https://ubuntu.com/security/notices/USN-3496-3
https://www.cve.org/CVERecord?id=CVE-2017-1000158
https://www.debian.org/security/2018/dsa-4307
|
| python-libs |
CVE-2019-18348 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-18348
https://bugs.python.org/issue30458#msg347282
https://bugzilla.redhat.com/show_bug.cgi?id=1727276
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://nvd.nist.gov/vuln/detail/CVE-2019-18348
https://security.netapp.com/advisory/ntap-20191107-0004/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.cve.org/CVERecord?id=CVE-2019-18348
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| python-libs |
CVE-2020-10735 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://www.openwall.com/lists/oss-security/2022/09/21/1
http://www.openwall.com/lists/oss-security/2022/09/21/4
https://access.redhat.com/errata/RHSA-2022:7323
https://access.redhat.com/security/cve/CVE-2020-10735
https://bugzilla.redhat.com/1834423
https://bugzilla.redhat.com/show_bug.cgi?id=1834423
https://bugzilla.redhat.com/show_bug.cgi?id=2120642
https://bugzilla.redhat.com/show_bug.cgi?id=2144072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061
https://docs.google.com/document/d/1KjuF_aXlzPUxTK4BMgezGJ2Pn7uevfX7g0_mvgHlL7Y
https://errata.almalinux.org/9/ALSA-2022-7323.html
https://errata.rockylinux.org/RLSA-2023:0833
https://github.com/python/cpython/issues/95778
https://linux.oracle.com/cve/CVE-2020-10735.html
https://linux.oracle.com/errata/ELSA-2023-2764.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/76YE7AM37MRU76XJV4M27CWDAMUGNRYK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NHC6IUU7CLRQ3QLPWUXLONSG3SXFTR47/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TD7JDDKJXK6D26XAN3YRFNM2LAJHT5UO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMWPRAAJS7I6U3U45V7GZVXWNSECI22M/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/
https://nvd.nist.gov/vuln/detail/CVE-2020-10735
https://www.cve.org/CVERecord?id=CVE-2020-10735
|
| python-libs |
CVE-2020-27619 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2020-27619
https://bugs.python.org/issue41944
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8
https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9
https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33
https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794
https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b
https://linux.oracle.com/cve/CVE-2020-27619.html
https://linux.oracle.com/errata/ELSA-2021-4151.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://nvd.nist.gov/vuln/detail/CVE-2020-27619
https://security.gentoo.org/glsa/202402-04
https://security.netapp.com/advisory/ntap-20201123-0004/
https://ubuntu.com/security/notices/USN-4754-1
https://ubuntu.com/security/notices/USN-4754-3
https://www.cve.org/CVERecord?id=CVE-2020-27619
https://www.oracle.com/security-alerts/cpujul2022.html
|
| python-libs |
CVE-2020-8492 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
https://access.redhat.com/security/cve/CVE-2020-8492
https://bugs.python.org/issue39503
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492
https://errata.almalinux.org/8/ALSA-2020-4641.html
https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4
https://github.com/python/cpython/pull/18284
https://linux.oracle.com/cve/CVE-2020-8492.html
https://linux.oracle.com/errata/ELSA-2020-4641.html
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5%40%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da%40%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/
https://nvd.nist.gov/vuln/detail/CVE-2020-8492
https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html
https://security.gentoo.org/glsa/202005-09
https://security.netapp.com/advisory/ntap-20200221-0001/
https://ubuntu.com/security/notices/USN-4333-1
https://ubuntu.com/security/notices/USN-4333-2
https://ubuntu.com/security/notices/USN-4754-3
https://ubuntu.com/security/notices/USN-5200-1
https://usn.ubuntu.com/4333-1/
https://usn.ubuntu.com/4333-2/
https://www.cve.org/CVERecord?id=CVE-2020-8492
|
| python-libs |
CVE-2021-23336 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://www.openwall.com/lists/oss-security/2021/02/19/4
http://www.openwall.com/lists/oss-security/2021/05/01/2
https://access.redhat.com/security/cve/CVE-2021-23336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master)
https://github.com/python/cpython/pull/24297
https://linux.oracle.com/cve/CVE-2021-23336.html
https://linux.oracle.com/errata/ELSA-2021-4162.html
https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367%40%3Cusers.airflow.apache.org%3E
https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html
https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/
https://nvd.nist.gov/vuln/detail/CVE-2021-23336
https://security.gentoo.org/glsa/202104-04
https://security.netapp.com/advisory/ntap-20210326-0004/
https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/
https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933
https://ubuntu.com/security/notices/USN-4742-1
https://www.cve.org/CVERecord?id=CVE-2021-23336
https://www.djangoproject.com/weblog/2021/feb/19/security-releases/
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| python-libs |
CVE-2021-3733 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-3733
https://bugs.python.org/issue43075
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final
https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final
https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final
https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final
https://errata.almalinux.org/8/ALSA-2022-1821.html
https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14)
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb
https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master)
https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5)
https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11)
https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10)
https://github.com/python/cpython/pull/24391
https://linux.oracle.com/cve/CVE-2021-3733.html
https://linux.oracle.com/errata/ELSA-2022-1821.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3733
https://security.netapp.com/advisory/ntap-20220407-0001/
https://ubuntu.com/security/CVE-2021-3733
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://www.cve.org/CVERecord?id=CVE-2021-3733
|
| python-libs |
CVE-2021-4189 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-4189
https://bugs.python.org/issue43285
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://bugzilla.redhat.com/show_bug.cgi?id=2006792
https://bugzilla.redhat.com/show_bug.cgi?id=2032569
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://bugzilla.redhat.com/show_bug.cgi?id=2047376
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://errata.rockylinux.org/RLSA-2022:1821
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e
https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master)
https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14)
https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11)
https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3)
https://linux.oracle.com/cve/CVE-2021-4189.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
https://nvd.nist.gov/vuln/detail/CVE-2021-4189
https://python-security.readthedocs.io/vuln/ftplib-pasv.html
https://security-tracker.debian.org/tracker/CVE-2021-4189
https://security.netapp.com/advisory/ntap-20221104-0004/
https://ubuntu.com/security/notices/USN-5342-1
https://ubuntu.com/security/notices/USN-5342-2
https://www.cve.org/CVERecord?id=CVE-2021-4189
|
| python-libs |
CVE-2022-0391 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/errata/RHSA-2022:6457
https://access.redhat.com/security/cve/CVE-2022-0391
https://bugs.python.org/issue43882
https://bugzilla.redhat.com/2047376
https://bugzilla.redhat.com/2075390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-6457.html
https://linux.oracle.com/cve/CVE-2022-0391.html
https://linux.oracle.com/errata/ELSA-2023-3550.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/
https://nvd.nist.gov/vuln/detail/CVE-2022-0391
https://security.gentoo.org/glsa/202305-02
https://security.netapp.com/advisory/ntap-20220225-0009/
https://ubuntu.com/security/notices/USN-5342-1
https://ubuntu.com/security/notices/USN-5342-2
https://www.cve.org/CVERecord?id=CVE-2022-0391
https://www.oracle.com/security-alerts/cpuapr2022.html
|
| python-libs |
CVE-2022-45061 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/errata/RHSA-2023:0953
https://access.redhat.com/security/cve/CVE-2022-45061
https://bugzilla.redhat.com/2144072
https://bugzilla.redhat.com/show_bug.cgi?id=2144072
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061
https://errata.almalinux.org/9/ALSA-2023-0953.html
https://errata.rockylinux.org/RLSA-2023:0953
https://github.com/python/cpython/issues/98433
https://github.com/python/cpython/pull/99092
https://github.com/python/cpython/pull/99230 (3.9-branch)
https://github.com/python/cpython/pull/99231 (3.8-branch)
https://linux.oracle.com/cve/CVE-2022-45061.html
https://linux.oracle.com/errata/ELSA-2023-2860.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/
https://nvd.nist.gov/vuln/detail/CVE-2022-45061
https://python-security.readthedocs.io/vuln/slow-idna-large-strings.html
https://security.gentoo.org/glsa/202305-02
https://security.netapp.com/advisory/ntap-20221209-0007/
https://ubuntu.com/security/notices/USN-5767-1
https://ubuntu.com/security/notices/USN-5767-2
https://ubuntu.com/security/notices/USN-5888-1
https://www.cve.org/CVERecord?id=CVE-2022-45061
|
| python-libs |
CVE-2022-48560 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0114
https://access.redhat.com/security/cve/CVE-2022-48560
https://bugs.python.org/issue39421
https://bugzilla.redhat.com/2249750
https://bugzilla.redhat.com/2249755
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48560
https://errata.almalinux.org/8/ALSA-2024-0114.html
https://github.com/python/cpython/commit/79f89e6e5a659846d1068e8b1bd8e491ccdef861 (v3.9.0a3)
https://github.com/python/cpython/commit/958064f8d2b84062b0582bbae911df8ccfc11fd6 (v3.7.7rc1)
https://github.com/python/cpython/issues/83602
https://linux.oracle.com/cve/CVE-2022-48560.html
https://linux.oracle.com/errata/ELSA-2024-0114.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZ5OOBWNYWXFTZDMCGHJVGDLDTHLWITJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VO7Y2YZSDK3UYJD2KBGLXRTGNG6T326J/
https://nvd.nist.gov/vuln/detail/CVE-2022-48560
https://security.netapp.com/advisory/ntap-20230929-0008/
https://ubuntu.com/security/notices/USN-6394-1
https://ubuntu.com/security/notices/USN-6394-2
https://www.cve.org/CVERecord?id=CVE-2022-48560
|
| python-libs |
CVE-2022-48565 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-48565
https://bugs.python.org/issue42051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48565
https://github.com/python/cpython/commit/05ee790f4d1cd8725a90b54268fc1dfe5b4d1fa2 (v3.10.0a2)
https://github.com/python/cpython/commit/479553c7c11306a09ce34edb6ef208133b7b95fe (3.9)
https://github.com/python/cpython/commit/e512bc799e3864fe3b1351757261762d63471efc (v3.7.10)
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AFHYAGWBFBNUGWU6XWKBHTCV5NH77MB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BAYWJD576JUKLHCWKDLMJSUGTRDKPF3M/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KZRZRJHWLZ7MOJNPQBWGJVXMVYDC5BRA/
https://nvd.nist.gov/vuln/detail/CVE-2022-48565
https://security.netapp.com/advisory/ntap-20231006-0007/
https://ubuntu.com/security/notices/USN-6354-1
https://www.cve.org/CVERecord?id=CVE-2022-48565
|
| python-libs |
CVE-2022-48566 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-48566
https://bugs.python.org/issue40791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48566
https://github.com/python/cpython/commit/8183e11d87388e4e44e3242c42085b87a878f781
https://github.com/python/cpython/issues/84968
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2022-48566
https://security.netapp.com/advisory/ntap-20231006-0013/
https://ubuntu.com/security/notices/USN-6400-1
https://www.cve.org/CVERecord?id=CVE-2022-48566
|
| python-libs |
CVE-2023-27043 |
MEDIUM |
2.7.5-94.el7_9 |
|
http://python.org
https://access.redhat.com/articles/7051467
https://access.redhat.com/errata/RHSA-2024:0466
https://access.redhat.com/security/cve/CVE-2023-27043
https://bugzilla.redhat.com/2196183
https://bugzilla.redhat.com/show_bug.cgi?id=2196183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043
https://errata.almalinux.org/9/ALSA-2024-0466.html
https://errata.rockylinux.org/RLSA-2024:0256
https://github.com/python/cpython/issues/102988
https://github.com/python/cpython/pull/102990
https://github.com/python/cpython/pull/105127
https://linux.oracle.com/cve/CVE-2023-27043.html
https://linux.oracle.com/errata/ELSA-2024-0466.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
https://nvd.nist.gov/vuln/detail/CVE-2023-27043
https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html
https://security.netapp.com/advisory/ntap-20230601-0003/
https://www.cve.org/CVERecord?id=CVE-2023-27043
|
| python-libs |
CVE-2023-36632 |
MEDIUM |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-36632
https://docs.python.org/3/library/email.html
https://docs.python.org/3/library/email.utils.html
https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-email.utils.parseaddr.py
https://github.com/python/cpython/issues/103800
https://nvd.nist.gov/vuln/detail/CVE-2023-36632
https://www.cve.org/CVERecord?id=CVE-2023-36632
|
| python-libs |
CVE-2018-1000030 |
LOW |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2018-1000030
https://bugs.python.org/issue31530
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030
https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view
https://nvd.nist.gov/vuln/detail/CVE-2018-1000030
https://security.gentoo.org/glsa/201811-02
https://ubuntu.com/security/notices/USN-3817-1
https://ubuntu.com/security/notices/USN-3817-2
https://usn.ubuntu.com/3817-1/
https://usn.ubuntu.com/3817-2/
https://www.cve.org/CVERecord?id=CVE-2018-1000030
https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0
https://www.oracle.com/security-alerts/cpujan2020.html
|
| python-libs |
CVE-2019-9674 |
LOW |
2.7.5-94.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html
https://access.redhat.com/security/cve/CVE-2019-9674
https://bugs.python.org/issue36260
https://bugs.python.org/issue36462
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674
https://github.com/python/cpython/blob/master/Lib/zipfile.py
https://nvd.nist.gov/vuln/detail/CVE-2019-9674
https://python-security.readthedocs.io/security.html#archives-and-zip-bomb
https://security.netapp.com/advisory/ntap-20200221-0003/
https://ubuntu.com/security/notices/USN-4428-1
https://ubuntu.com/security/notices/USN-4754-3
https://usn.ubuntu.com/4428-1/
https://www.cve.org/CVERecord?id=CVE-2019-9674
https://www.python.org/news/security/
|
| python-libs |
CVE-2021-3737 |
LOW |
2.7.5-94.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-3737
https://bugs.python.org/issue44022
https://bugzilla.redhat.com/show_bug.cgi?id=1995162
https://bugzilla.redhat.com/show_bug.cgi?id=1995234
https://bugzilla.redhat.com/show_bug.cgi?id=2006792
https://bugzilla.redhat.com/show_bug.cgi?id=2032569
https://bugzilla.redhat.com/show_bug.cgi?id=2036020
https://bugzilla.redhat.com/show_bug.cgi?id=2047376
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391
https://errata.almalinux.org/8/ALSA-2022-1986.html
https://errata.rockylinux.org/RLSA-2022:1821
https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch)
https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11)
https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14
https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6)
https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2)
https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3)
https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6)
https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11)
https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14)
https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11)
https://github.com/python/cpython/pull/25916
https://github.com/python/cpython/pull/26503
https://linux.oracle.com/cve/CVE-2021-3737.html
https://linux.oracle.com/errata/ELSA-2022-1986.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3737
https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html
https://security.netapp.com/advisory/ntap-20220407-0009/
https://ubuntu.com/security/CVE-2021-3737
https://ubuntu.com/security/notices/USN-5083-1
https://ubuntu.com/security/notices/USN-5199-1
https://ubuntu.com/security/notices/USN-5200-1
https://ubuntu.com/security/notices/USN-5201-1
https://www.cve.org/CVERecord?id=CVE-2021-3737
https://www.oracle.com/security-alerts/cpujul2022.html
|
| python-lxml |
CVE-2018-19787 |
MEDIUM |
3.2.1-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2018-19787
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19787
https://github.com/advisories/GHSA-xp26-p53h-6h2p
https://github.com/lxml/lxml
https://github.com/lxml/lxml/commit/6be1d081b49c97cfd7b3fbd934a193b668629109
https://github.com/pypa/advisory-database/tree/main/vulns/lxml/PYSEC-2018-12.yaml
https://lists.debian.org/debian-lts-announce/2018/12/msg00001.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00044.html
https://nvd.nist.gov/vuln/detail/CVE-2018-19787
https://ubuntu.com/security/notices/USN-3841-1
https://ubuntu.com/security/notices/USN-3841-2
https://usn.ubuntu.com/3841-1
https://usn.ubuntu.com/3841-1/
https://usn.ubuntu.com/3841-2
https://usn.ubuntu.com/3841-2/
https://www.cve.org/CVERecord?id=CVE-2018-19787
|
| python-lxml |
CVE-2020-27783 |
MEDIUM |
3.2.1-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2020-27783
https://advisory.checkmarx.net/advisory/CX-2020-4286
https://bugzilla.redhat.com/show_bug.cgi?id=1868006
https://bugzilla.redhat.com/show_bug.cgi?id=1883014
https://bugzilla.redhat.com/show_bug.cgi?id=1886755
https://bugzilla.redhat.com/show_bug.cgi?id=1901633
https://bugzilla.redhat.com/show_bug.cgi?id=1918168
https://bugzilla.redhat.com/show_bug.cgi?id=1920596
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27783
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177
https://errata.almalinux.org/8/ALSA-2021-1879.html
https://errata.rockylinux.org/RLSA-2021:1879
https://github.com/lxml/lxml
https://github.com/lxml/lxml/commit/89e7aad6e7ff9ecd88678ff25f885988b184b26e (lxml-4.6.1)
https://github.com/lxml/lxml/commit/a105ab8dc262ec6735977c25c13f0bdfcdec72a7
https://linux.oracle.com/cve/CVE-2020-27783.html
https://linux.oracle.com/errata/ELSA-2022-9341.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00028.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKG67GPGTV23KADT4D4GK4RMHSO4CIQL
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK
https://nvd.nist.gov/vuln/detail/CVE-2020-27783
https://pypi.org/project/lxml
https://security.netapp.com/advisory/ntap-20210521-0003
https://security.netapp.com/advisory/ntap-20210521-0003/
https://snyk.io/vuln/SNYK-PYTHON-LXML-1047473
https://ubuntu.com/security/notices/USN-4666-1
https://ubuntu.com/security/notices/USN-4666-2
https://www.cve.org/CVERecord?id=CVE-2020-27783
https://www.debian.org/security/2020/dsa-4810
https://www.oracle.com//security-alerts/cpujul2021.html
|
| python-lxml |
CVE-2021-28957 |
MEDIUM |
3.2.1-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-28957
https://bugs.launchpad.net/lxml/+bug/1888153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28957
https://errata.almalinux.org/8/ALSA-2021-4162.html
https://github.com/lxml/lxml
https://github.com/lxml/lxml/commit/2d01a1ba8984e0483ce6619b972832377f208a0d
https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999
https://github.com/lxml/lxml/pull/316
https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270
https://linux.oracle.com/cve/CVE-2021-28957.html
https://linux.oracle.com/errata/ELSA-2022-9341.html
https://lists.debian.org/debian-lts-announce/2021/03/msg00031.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3C2R44VDUY7FJVMAVRZ2WY7XYL4SVN45/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XXN3QPWCTQVOGW4BMWV3AUUZZ4NRZNSQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3C2R44VDUY7FJVMAVRZ2WY7XYL4SVN45
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXN3QPWCTQVOGW4BMWV3AUUZZ4NRZNSQ
https://nvd.nist.gov/vuln/detail/CVE-2021-28957
https://pypi.org/project/lxml
https://security.gentoo.org/glsa/202208-06
https://security.netapp.com/advisory/ntap-20210521-0004
https://security.netapp.com/advisory/ntap-20210521-0004/
https://ubuntu.com/security/notices/USN-4896-1
https://ubuntu.com/security/notices/USN-4896-2
https://www.cve.org/CVERecord?id=CVE-2021-28957
https://www.debian.org/security/2021/dsa-4880
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| python-lxml |
CVE-2021-43818 |
MEDIUM |
3.2.1-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-43818
https://bugzilla.redhat.com/show_bug.cgi?id=2032569
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818
https://errata.almalinux.org/8/ALSA-2022-1932.html
https://errata.rockylinux.org/RLSA-2022:1932
https://github.com/lxml/lxml
https://github.com/lxml/lxml/blob/lxml-4.6.5/CHANGES.txt
https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a
https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a (lxml-4.6.5)
https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776
https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0
https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0 (lxml-4.6.5)
https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8
https://linux.oracle.com/cve/CVE-2021-43818.html
https://linux.oracle.com/errata/ELSA-2022-9341.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUIS2KE3HZ2AAQKXFLTJFZPP2IFHJTC7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2XMOM5PFT6U5AAXY6EFNT5JZCKKHK2V
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZGNET2A4WGLSUXLBFYKNC5PXHQMI3I7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQ4SPKJX3RRJK4UWA6FXCRHD2TVRQI44
https://nvd.nist.gov/vuln/detail/CVE-2021-43818
https://security.gentoo.org/glsa/202208-06
https://security.netapp.com/advisory/ntap-20220107-0005
https://security.netapp.com/advisory/ntap-20220107-0005/
https://ubuntu.com/security/notices/USN-5225-1
https://www.cve.org/CVERecord?id=CVE-2021-43818
https://www.debian.org/security/2022/dsa-5043
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
|
| python-lxml |
CVE-2014-3146 |
LOW |
3.2.1-4.el7 |
|
http://advisories.mageia.org/MGASA-2014-0218.html
http://lists.opensuse.org/opensuse-updates/2014-05/msg00083.html
http://lxml.de/3.3/changes-3.3.5.html
http://seclists.org/fulldisclosure/2014/Apr/210
http://seclists.org/fulldisclosure/2014/Apr/319
http://secunia.com/advisories/58013
http://secunia.com/advisories/58744
http://secunia.com/advisories/59008
http://www.debian.org/security/2014/dsa-2941
http://www.mandriva.com/security/advisories?name=MDVSA-2015:112
http://www.openwall.com/lists/oss-security/2014/05/09/7
http://www.securityfocus.com/bid/67159
http://www.ubuntu.com/usn/USN-2217-1
https://access.redhat.com/security/cve/CVE-2014-3146
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3146
https://github.com/lxml/lxml/commit/3f3082e0a67851cde26a48da3d1f4b75d8aa07ec
https://github.com/lxml/lxml/commit/86e81ab393ba14c1be71284675851a3bdce57d69
https://github.com/lxml/lxml/commit/e86b294f1f81b899a59925123560ff924a72f1cc
https://github.com/lxml/lxml/pull/273
https://mailman-mail5.webfaction.com/pipermail/lxml/2014-April/007128.html
https://nvd.nist.gov/vuln/detail/CVE-2014-3146
https://ubuntu.com/security/notices/USN-2217-1
https://web.archive.org/web/20140724172044/http://secunia.com/advisories/58013
https://web.archive.org/web/20140805110535/http://secunia.com/advisories/59008
https://web.archive.org/web/20140806061046/http://secunia.com/advisories/58744
https://web.archive.org/web/20141017122607/https://mailman-mail5.webfaction.com/pipermail/lxml/2014-April/007128.html
https://web.archive.org/web/20150523055039/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2015:112/?name=MDVSA-2015:112
https://web.archive.org/web/20200228180542/http://www.securityfocus.com/bid/67159
https://www.cve.org/CVERecord?id=CVE-2014-3146
|
| readline |
CVE-2016-7091 |
LOW |
6.2-11.el7 |
|
http://www.securityfocus.com/bid/92615
https://access.redhat.com/security/cve/CVE-2016-7091
https://linux.oracle.com/cve/CVE-2016-7091.html
https://linux.oracle.com/errata/ELSA-2016-2593.html
https://lists.gnu.org/archive/html/bug-readline/2016-05/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2016-7091
https://rhn.redhat.com/errata/RHSA-2016-2593.html
https://www.cve.org/CVERecord?id=CVE-2016-7091
|
| rpm |
CVE-2017-7500 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2017-7500
https://bugzilla.redhat.com/show_bug.cgi?id=1450369
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
https://nvd.nist.gov/vuln/detail/CVE-2017-7500
https://www.cve.org/CVERecord?id=CVE-2017-7500
|
| rpm |
CVE-2017-7501 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2017-7501
https://bugzilla.redhat.com/show_bug.cgi?id=1452133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7501
https://security.gentoo.org/glsa/201811-22
https://www.cve.org/CVERecord?id=CVE-2017-7501
|
| rpm |
CVE-2021-3421 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json
https://access.redhat.com/security/cve/CVE-2021-3421
https://bugzilla.redhat.com/show_bug.cgi?id=1927747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-3421
https://security.gentoo.org/glsa/202107-43
https://ubuntu.com/security/notices/USN-5273-1
https://www.cve.org/CVERecord?id=CVE-2021-3421
|
| rpm |
CVE-2021-3521 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
https://access.redhat.com/security/cve/CVE-2021-3521
https://bugzilla.redhat.com/show_bug.cgi?id=1941098
https://github.com/rpm-software-management/rpm/commit/bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8
https://github.com/rpm-software-management/rpm/pull/1795/
https://linux.oracle.com/cve/CVE-2021-3521.html
https://linux.oracle.com/errata/ELSA-2022-0368.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3521
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-3521
|
| rpm |
CVE-2021-35937 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35937
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://linux.oracle.com/cve/CVE-2021-35937.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35937
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35937
https://www.usenix.org/legacy/event/sec05/tech/full_papers/borisov/borisov.pdf
|
| rpm |
CVE-2021-35938 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35938
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://bugzilla.suse.com/show_bug.cgi?id=1157880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033
https://github.com/rpm-software-management/rpm/pull/1919
https://linux.oracle.com/cve/CVE-2021-35938.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35938
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35938
|
| rpm |
CVE-2021-35939 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35939
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556
https://github.com/rpm-software-management/rpm/pull/1919
https://linux.oracle.com/cve/CVE-2021-35939.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35939
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35939
|
| rpm |
CVE-2021-20266 |
LOW |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-20266
https://bugzilla.redhat.com/show_bug.cgi?id=1927741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266
https://github.com/rpm-software-management/rpm/pull/1500
https://linux.oracle.com/cve/CVE-2021-20266.html
https://linux.oracle.com/errata/ELSA-2021-4489.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://nvd.nist.gov/vuln/detail/CVE-2021-20266
https://security.gentoo.org/glsa/202107-43
https://ubuntu.com/security/notices/USN-5273-1
https://www.cve.org/CVERecord?id=CVE-2021-20266
|
| rpm-build |
CVE-2017-7500 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2017-7500
https://bugzilla.redhat.com/show_bug.cgi?id=1450369
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
https://nvd.nist.gov/vuln/detail/CVE-2017-7500
https://www.cve.org/CVERecord?id=CVE-2017-7500
|
| rpm-build |
CVE-2017-7501 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2017-7501
https://bugzilla.redhat.com/show_bug.cgi?id=1452133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7501
https://security.gentoo.org/glsa/201811-22
https://www.cve.org/CVERecord?id=CVE-2017-7501
|
| rpm-build |
CVE-2021-3421 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json
https://access.redhat.com/security/cve/CVE-2021-3421
https://bugzilla.redhat.com/show_bug.cgi?id=1927747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-3421
https://security.gentoo.org/glsa/202107-43
https://ubuntu.com/security/notices/USN-5273-1
https://www.cve.org/CVERecord?id=CVE-2021-3421
|
| rpm-build |
CVE-2021-3521 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
https://access.redhat.com/security/cve/CVE-2021-3521
https://bugzilla.redhat.com/show_bug.cgi?id=1941098
https://github.com/rpm-software-management/rpm/commit/bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8
https://github.com/rpm-software-management/rpm/pull/1795/
https://linux.oracle.com/cve/CVE-2021-3521.html
https://linux.oracle.com/errata/ELSA-2022-0368.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3521
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-3521
|
| rpm-build |
CVE-2021-35937 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35937
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://linux.oracle.com/cve/CVE-2021-35937.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35937
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35937
https://www.usenix.org/legacy/event/sec05/tech/full_papers/borisov/borisov.pdf
|
| rpm-build |
CVE-2021-35938 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35938
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://bugzilla.suse.com/show_bug.cgi?id=1157880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033
https://github.com/rpm-software-management/rpm/pull/1919
https://linux.oracle.com/cve/CVE-2021-35938.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35938
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35938
|
| rpm-build |
CVE-2021-35939 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35939
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556
https://github.com/rpm-software-management/rpm/pull/1919
https://linux.oracle.com/cve/CVE-2021-35939.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35939
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35939
|
| rpm-build |
CVE-2021-20266 |
LOW |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-20266
https://bugzilla.redhat.com/show_bug.cgi?id=1927741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266
https://github.com/rpm-software-management/rpm/pull/1500
https://linux.oracle.com/cve/CVE-2021-20266.html
https://linux.oracle.com/errata/ELSA-2021-4489.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://nvd.nist.gov/vuln/detail/CVE-2021-20266
https://security.gentoo.org/glsa/202107-43
https://ubuntu.com/security/notices/USN-5273-1
https://www.cve.org/CVERecord?id=CVE-2021-20266
|
| rpm-build-libs |
CVE-2017-7500 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2017-7500
https://bugzilla.redhat.com/show_bug.cgi?id=1450369
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
https://nvd.nist.gov/vuln/detail/CVE-2017-7500
https://www.cve.org/CVERecord?id=CVE-2017-7500
|
| rpm-build-libs |
CVE-2017-7501 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2017-7501
https://bugzilla.redhat.com/show_bug.cgi?id=1452133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7501
https://security.gentoo.org/glsa/201811-22
https://www.cve.org/CVERecord?id=CVE-2017-7501
|
| rpm-build-libs |
CVE-2021-3421 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json
https://access.redhat.com/security/cve/CVE-2021-3421
https://bugzilla.redhat.com/show_bug.cgi?id=1927747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-3421
https://security.gentoo.org/glsa/202107-43
https://ubuntu.com/security/notices/USN-5273-1
https://www.cve.org/CVERecord?id=CVE-2021-3421
|
| rpm-build-libs |
CVE-2021-3521 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
https://access.redhat.com/security/cve/CVE-2021-3521
https://bugzilla.redhat.com/show_bug.cgi?id=1941098
https://github.com/rpm-software-management/rpm/commit/bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8
https://github.com/rpm-software-management/rpm/pull/1795/
https://linux.oracle.com/cve/CVE-2021-3521.html
https://linux.oracle.com/errata/ELSA-2022-0368.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3521
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-3521
|
| rpm-build-libs |
CVE-2021-35937 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35937
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://linux.oracle.com/cve/CVE-2021-35937.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35937
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35937
https://www.usenix.org/legacy/event/sec05/tech/full_papers/borisov/borisov.pdf
|
| rpm-build-libs |
CVE-2021-35938 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35938
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://bugzilla.suse.com/show_bug.cgi?id=1157880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033
https://github.com/rpm-software-management/rpm/pull/1919
https://linux.oracle.com/cve/CVE-2021-35938.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35938
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35938
|
| rpm-build-libs |
CVE-2021-35939 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35939
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556
https://github.com/rpm-software-management/rpm/pull/1919
https://linux.oracle.com/cve/CVE-2021-35939.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35939
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35939
|
| rpm-build-libs |
CVE-2021-20266 |
LOW |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-20266
https://bugzilla.redhat.com/show_bug.cgi?id=1927741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266
https://github.com/rpm-software-management/rpm/pull/1500
https://linux.oracle.com/cve/CVE-2021-20266.html
https://linux.oracle.com/errata/ELSA-2021-4489.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://nvd.nist.gov/vuln/detail/CVE-2021-20266
https://security.gentoo.org/glsa/202107-43
https://ubuntu.com/security/notices/USN-5273-1
https://www.cve.org/CVERecord?id=CVE-2021-20266
|
| rpm-libs |
CVE-2017-7500 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2017-7500
https://bugzilla.redhat.com/show_bug.cgi?id=1450369
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
https://nvd.nist.gov/vuln/detail/CVE-2017-7500
https://www.cve.org/CVERecord?id=CVE-2017-7500
|
| rpm-libs |
CVE-2017-7501 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2017-7501
https://bugzilla.redhat.com/show_bug.cgi?id=1452133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7501
https://security.gentoo.org/glsa/201811-22
https://www.cve.org/CVERecord?id=CVE-2017-7501
|
| rpm-libs |
CVE-2021-3421 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json
https://access.redhat.com/security/cve/CVE-2021-3421
https://bugzilla.redhat.com/show_bug.cgi?id=1927747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-3421
https://security.gentoo.org/glsa/202107-43
https://ubuntu.com/security/notices/USN-5273-1
https://www.cve.org/CVERecord?id=CVE-2021-3421
|
| rpm-libs |
CVE-2021-3521 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
https://access.redhat.com/security/cve/CVE-2021-3521
https://bugzilla.redhat.com/show_bug.cgi?id=1941098
https://github.com/rpm-software-management/rpm/commit/bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8
https://github.com/rpm-software-management/rpm/pull/1795/
https://linux.oracle.com/cve/CVE-2021-3521.html
https://linux.oracle.com/errata/ELSA-2022-0368.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3521
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-3521
|
| rpm-libs |
CVE-2021-35937 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35937
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://linux.oracle.com/cve/CVE-2021-35937.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35937
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35937
https://www.usenix.org/legacy/event/sec05/tech/full_papers/borisov/borisov.pdf
|
| rpm-libs |
CVE-2021-35938 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35938
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://bugzilla.suse.com/show_bug.cgi?id=1157880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033
https://github.com/rpm-software-management/rpm/pull/1919
https://linux.oracle.com/cve/CVE-2021-35938.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35938
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35938
|
| rpm-libs |
CVE-2021-35939 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35939
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556
https://github.com/rpm-software-management/rpm/pull/1919
https://linux.oracle.com/cve/CVE-2021-35939.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35939
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35939
|
| rpm-libs |
CVE-2021-20266 |
LOW |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-20266
https://bugzilla.redhat.com/show_bug.cgi?id=1927741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266
https://github.com/rpm-software-management/rpm/pull/1500
https://linux.oracle.com/cve/CVE-2021-20266.html
https://linux.oracle.com/errata/ELSA-2021-4489.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://nvd.nist.gov/vuln/detail/CVE-2021-20266
https://security.gentoo.org/glsa/202107-43
https://ubuntu.com/security/notices/USN-5273-1
https://www.cve.org/CVERecord?id=CVE-2021-20266
|
| rpm-python |
CVE-2017-7500 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2017-7500
https://bugzilla.redhat.com/show_bug.cgi?id=1450369
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500
https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9
https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
https://nvd.nist.gov/vuln/detail/CVE-2017-7500
https://www.cve.org/CVERecord?id=CVE-2017-7500
|
| rpm-python |
CVE-2017-7501 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2017-7501
https://bugzilla.redhat.com/show_bug.cgi?id=1452133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501
https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-7501
https://security.gentoo.org/glsa/201811-22
https://www.cve.org/CVERecord?id=CVE-2017-7501
|
| rpm-python |
CVE-2021-3421 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json
https://access.redhat.com/security/cve/CVE-2021-3421
https://bugzilla.redhat.com/show_bug.cgi?id=1927747
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421
https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
https://nvd.nist.gov/vuln/detail/CVE-2021-3421
https://security.gentoo.org/glsa/202107-43
https://ubuntu.com/security/notices/USN-5273-1
https://www.cve.org/CVERecord?id=CVE-2021-3421
|
| rpm-python |
CVE-2021-3521 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json
https://access.redhat.com/security/cve/CVE-2021-3521
https://bugzilla.redhat.com/show_bug.cgi?id=1941098
https://github.com/rpm-software-management/rpm/commit/bd36c5dc9fb6d90c46fbfed8c2d67516fc571ec8
https://github.com/rpm-software-management/rpm/pull/1795/
https://linux.oracle.com/cve/CVE-2021-3521.html
https://linux.oracle.com/errata/ELSA-2022-0368.html
https://nvd.nist.gov/vuln/detail/CVE-2021-3521
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-3521
|
| rpm-python |
CVE-2021-35937 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35937
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://linux.oracle.com/cve/CVE-2021-35937.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35937
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35937
https://www.usenix.org/legacy/event/sec05/tech/full_papers/borisov/borisov.pdf
|
| rpm-python |
CVE-2021-35938 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35938
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://bugzilla.suse.com/show_bug.cgi?id=1157880
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://github.com/rpm-software-management/rpm/commit/25a435e90844ea98fe5eb7bef22c1aecf3a9c033
https://github.com/rpm-software-management/rpm/pull/1919
https://linux.oracle.com/cve/CVE-2021-35938.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35938
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35938
|
| rpm-python |
CVE-2021-35939 |
MEDIUM |
4.11.3-48.el7_9 |
|
https://access.redhat.com/errata/RHSA-2024:0463
https://access.redhat.com/security/cve/CVE-2021-35939
https://bugzilla.redhat.com/1964114
https://bugzilla.redhat.com/1964125
https://bugzilla.redhat.com/1964129
https://bugzilla.redhat.com/show_bug.cgi?id=1964114
https://bugzilla.redhat.com/show_bug.cgi?id=1964125
https://bugzilla.redhat.com/show_bug.cgi?id=1964129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939
https://errata.almalinux.org/9/ALSA-2024-0463.html
https://errata.rockylinux.org/RLSA-2024:0647
https://github.com/rpm-software-management/rpm/commit/96ec957e281220f8e137a2d5eb23b83a6377d556
https://github.com/rpm-software-management/rpm/pull/1919
https://linux.oracle.com/cve/CVE-2021-35939.html
https://linux.oracle.com/errata/ELSA-2024-0647.html
https://nvd.nist.gov/vuln/detail/CVE-2021-35939
https://rpm.org/wiki/Releases/4.18.0
https://security.gentoo.org/glsa/202210-22
https://www.cve.org/CVERecord?id=CVE-2021-35939
|
| rpm-python |
CVE-2021-20266 |
LOW |
4.11.3-48.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-20266
https://bugzilla.redhat.com/show_bug.cgi?id=1927741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266
https://github.com/rpm-software-management/rpm/pull/1500
https://linux.oracle.com/cve/CVE-2021-20266.html
https://linux.oracle.com/errata/ELSA-2021-4489.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
https://nvd.nist.gov/vuln/detail/CVE-2021-20266
https://security.gentoo.org/glsa/202107-43
https://ubuntu.com/security/notices/USN-5273-1
https://www.cve.org/CVERecord?id=CVE-2021-20266
|
| shadow-utils |
CVE-2023-4641 |
LOW |
2:4.6-5.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6632
https://access.redhat.com/errata/RHSA-2023:7112
https://access.redhat.com/security/cve/CVE-2023-4641
https://bugzilla.redhat.com/2215945
https://bugzilla.redhat.com/show_bug.cgi?id=2215945
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4641
https://errata.almalinux.org/9/ALSA-2023-6632.html
https://linux.oracle.com/cve/CVE-2023-4641.html
https://linux.oracle.com/errata/ELSA-2023-7112.html
https://nvd.nist.gov/vuln/detail/CVE-2023-4641
https://ubuntu.com/security/notices/USN-6640-1
https://www.cve.org/CVERecord?id=CVE-2023-4641
|
| sqlite |
CVE-2015-7036 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
http://support.apple.com/kb/HT204941
http://support.apple.com/kb/HT204942
http://zerodayinitiative.com/advisories/ZDI-15-570/
https://access.redhat.com/security/cve/CVE-2015-7036
https://nvd.nist.gov/vuln/detail/CVE-2015-7036
https://security.gentoo.org/glsa/201612-21
https://www.cve.org/CVERecord?id=CVE-2015-7036
|
| sqlite |
CVE-2017-7000 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
http://www.securityfocus.com/bid/98767
http://www.securityfocus.com/bid/99950
https://access.redhat.com/errata/RHSA-2017:1833
https://access.redhat.com/security/cve/CVE-2017-7000
https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7000
https://nvd.nist.gov/vuln/detail/CVE-2017-7000
https://security.gentoo.org/glsa/201709-15
https://support.apple.com/HT207797
https://support.apple.com/HT207798
https://www.cve.org/CVERecord?id=CVE-2017-7000
https://www.debian.org/security/2017/dsa-3926
https://www.sqlite.org/bindptr.html
|
| sqlite |
CVE-2019-13751 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
https://access.redhat.com/errata/RHSA-2019:4238
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13750.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13751.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19603.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5827.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13435.json
https://access.redhat.com/security/cve/CVE-2019-13751
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
https://crbug.com/1025465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13751
https://errata.almalinux.org/8/ALSA-2021-4396.html
https://linux.oracle.com/cve/CVE-2019-13751.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
https://nvd.nist.gov/vuln/detail/CVE-2019-13751
https://seclists.org/bugtraq/2020/Jan/27
https://security.gentoo.org/glsa/202003-08
https://ubuntu.com/security/notices/USN-4298-1
https://ubuntu.com/security/notices/USN-4298-2
https://usn.ubuntu.com/4298-1/
https://usn.ubuntu.com/4298-2/
https://www.cve.org/CVERecord?id=CVE-2019-13751
https://www.debian.org/security/2020/dsa-4606
|
| sqlite |
CVE-2019-13752 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
https://access.redhat.com/errata/RHSA-2019:4238
https://access.redhat.com/security/cve/CVE-2019-13752
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
https://crbug.com/1025470
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13752
https://linux.oracle.com/cve/CVE-2019-13752.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
https://nvd.nist.gov/vuln/detail/CVE-2019-13752
https://seclists.org/bugtraq/2020/Jan/27
https://security.gentoo.org/glsa/202003-08
https://ubuntu.com/security/notices/USN-4298-1
https://ubuntu.com/security/notices/USN-4298-2
https://usn.ubuntu.com/4298-1/
https://usn.ubuntu.com/4298-2/
https://www.cve.org/CVERecord?id=CVE-2019-13752
https://www.debian.org/security/2020/dsa-4606
|
| sqlite |
CVE-2019-13753 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html
http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html
https://access.redhat.com/errata/RHSA-2019:4238
https://access.redhat.com/security/cve/CVE-2019-13753
https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html
https://crbug.com/1025471
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13753
https://linux.oracle.com/cve/CVE-2019-13753.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/
https://nvd.nist.gov/vuln/detail/CVE-2019-13753
https://seclists.org/bugtraq/2020/Jan/27
https://security.gentoo.org/glsa/202003-08
https://ubuntu.com/security/notices/USN-4298-1
https://ubuntu.com/security/notices/USN-4298-2
https://usn.ubuntu.com/4298-1/
https://usn.ubuntu.com/4298-2/
https://www.cve.org/CVERecord?id=CVE-2019-13753
https://www.debian.org/security/2020/dsa-4606
|
| sqlite |
CVE-2019-19603 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13750.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13751.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19603.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5827.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13435.json
https://access.redhat.com/security/cve/CVE-2019-19603
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
https://errata.almalinux.org/8/ALSA-2021-4396.html
https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
https://linux.oracle.com/cve/CVE-2019-19603.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-19603
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.cve.org/CVERecord?id=CVE-2019-19603
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.sqlite.org/
|
| sqlite |
CVE-2019-19645 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
https://access.redhat.com/security/cve/CVE-2019-19645
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645
https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06
https://nvd.nist.gov/vuln/detail/CVE-2019-19645
https://security.netapp.com/advisory/ntap-20191223-0001/
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.cve.org/CVERecord?id=CVE-2019-19645
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.tenable.com/security/tns-2021-14
|
| sqlite |
CVE-2019-19880 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html
https://access.redhat.com/errata/RHSA-2020:0514
https://access.redhat.com/security/cve/CVE-2019-19880
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880
https://github.com/sqlite/sqlite/commit/75e95e1fcd52d3ec8282edb75ac8cd0814095d54
https://nvd.nist.gov/vuln/detail/CVE-2019-19880
https://security.netapp.com/advisory/ntap-20200114-0001/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.cve.org/CVERecord?id=CVE-2019-19880
https://www.debian.org/security/2020/dsa-4638
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| sqlite |
CVE-2019-19924 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
https://access.redhat.com/security/cve/CVE-2019-19924
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924
https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3
https://linux.oracle.com/cve/CVE-2019-19924.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-19924
https://security.netapp.com/advisory/ntap-20200114-0003/
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.cve.org/CVERecord?id=CVE-2019-19924
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| sqlite |
CVE-2019-20218 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
https://access.redhat.com/security/cve/CVE-2019-20218
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218
https://github.com/sqlite/sqlite/commit/a6c1a71cde082e09750465d5675699062922e387
https://linux.oracle.com/cve/CVE-2019-20218.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00016.html
https://nvd.nist.gov/vuln/detail/CVE-2019-20218
https://security.gentoo.org/glsa/202007-26
https://ubuntu.com/security/notices/USN-4298-1
https://usn.ubuntu.com/4298-1/
https://www.cve.org/CVERecord?id=CVE-2019-20218
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| sqlite |
CVE-2019-5827 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13750.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13751.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19603.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5827.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13435.json
https://access.redhat.com/security/cve/CVE-2019-5827
https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html
https://crbug.com/952406
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827
https://errata.almalinux.org/8/ALSA-2021-4396.html
https://linux.oracle.com/cve/CVE-2019-5827.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/
https://nvd.nist.gov/vuln/detail/CVE-2019-5827
https://seclists.org/bugtraq/2019/Aug/19
https://security.gentoo.org/glsa/202003-16
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.cve.org/CVERecord?id=CVE-2019-5827
https://www.debian.org/security/2019/dsa-4500
|
| sqlite |
CVE-2019-8457 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html
https://access.redhat.com/security/cve/CVE-2019-8457
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457
https://kc.mcafee.com/corporate/index?page=content&id=SB10365
https://linux.oracle.com/cve/CVE-2019-8457.html
https://linux.oracle.com/errata/ELSA-2020-1810.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/
https://nvd.nist.gov/vuln/detail/CVE-2019-8457
https://security.netapp.com/advisory/ntap-20190606-0002/
https://ubuntu.com/security/notices/USN-4004-1
https://ubuntu.com/security/notices/USN-4004-2
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4004-1/
https://usn.ubuntu.com/4004-2/
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.cve.org/CVERecord?id=CVE-2019-8457
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.sqlite.org/releaselog/3_28_0.html
https://www.sqlite.org/src/info/90acdbfce9c08858
|
| sqlite |
CVE-2020-13435 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13750.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13751.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19603.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5827.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13435.json
https://access.redhat.com/security/cve/CVE-2020-13435
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435
https://errata.almalinux.org/8/ALSA-2021-4396.html
https://linux.oracle.com/cve/CVE-2020-13435.html
https://linux.oracle.com/errata/ELSA-2021-4396.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://nvd.nist.gov/vuln/detail/CVE-2020-13435
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200528-0004/
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.cve.org/CVERecord?id=CVE-2020-13435
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.sqlite.org/src/info/7a5279a25c57adf1
|
| sqlite |
CVE-2020-13631 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
http://seclists.org/fulldisclosure/2020/Dec/32
http://seclists.org/fulldisclosure/2020/Nov/19
http://seclists.org/fulldisclosure/2020/Nov/20
http://seclists.org/fulldisclosure/2020/Nov/22
https://access.redhat.com/security/cve/CVE-2020-13631
https://bugs.chromium.org/p/chromium/issues/detail?id=1080459
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631
https://errata.almalinux.org/8/ALSA-2021-1968.html
https://linux.oracle.com/cve/CVE-2020-13631.html
https://linux.oracle.com/errata/ELSA-2020-4442.html
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/
https://nvd.nist.gov/vuln/detail/CVE-2020-13631
https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc
https://security.gentoo.org/glsa/202007-26
https://security.netapp.com/advisory/ntap-20200608-0002/
https://sqlite.org/src/info/eca0ba2cf4c0fdf7
https://support.apple.com/kb/HT211843
https://support.apple.com/kb/HT211844
https://support.apple.com/kb/HT211850
https://support.apple.com/kb/HT211931
https://support.apple.com/kb/HT211935
https://support.apple.com/kb/HT211952
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4394-1/
https://www.cve.org/CVERecord?id=CVE-2020-13631
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| sqlite |
CVE-2020-24736 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
https://access.redhat.com/errata/RHSA-2023:3840
https://access.redhat.com/security/cve/CVE-2020-24736
https://bugzilla.redhat.com/2186385
https://bugzilla.redhat.com/show_bug.cgi?id=2186385
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24736
https://errata.almalinux.org/8/ALSA-2023-3840.html
https://errata.rockylinux.org/RLSA-2023:3840
https://linux.oracle.com/cve/CVE-2020-24736.html
https://linux.oracle.com/errata/ELSA-2023-3840.html
https://nvd.nist.gov/vuln/detail/CVE-2020-24736
https://security.netapp.com/advisory/ntap-20230526-0005/
https://www.cve.org/CVERecord?id=CVE-2020-24736
https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959
|
| sqlite |
CVE-2020-35527 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
https://access.redhat.com/errata/RHSA-2022:7108
https://access.redhat.com/security/cve/CVE-2020-35527
https://bugzilla.redhat.com/2122324
https://bugzilla.redhat.com/2122329
https://bugzilla.redhat.com/show_bug.cgi?id=2122324
https://bugzilla.redhat.com/show_bug.cgi?id=2122329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35527
https://errata.almalinux.org/8/ALSA-2022-7108.html
https://errata.rockylinux.org/RLSA-2022:7108
https://linux.oracle.com/cve/CVE-2020-35527.html
https://linux.oracle.com/errata/ELSA-2022-7108.html
https://nvd.nist.gov/vuln/detail/CVE-2020-35527
https://security.netapp.com/advisory/ntap-20221111-0007/
https://ubuntu.com/security/notices/USN-5615-1
https://www.cve.org/CVERecord?id=CVE-2020-35527
https://www.sqlite.org/src/info/c431b3fd8fd0f6a6
|
| sqlite |
CVE-2022-35737 |
MEDIUM |
3.7.17-8.el7_7.1 |
|
https://access.redhat.com/errata/RHSA-2023:0339
https://access.redhat.com/security/cve/CVE-2022-35737
https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api
https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/
https://bugzilla.redhat.com/2110291
https://bugzilla.redhat.com/show_bug.cgi?id=2110291
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737
https://errata.almalinux.org/9/ALSA-2023-0339.html
https://errata.rockylinux.org/RLSA-2023:0339
https://github.com/rusqlite/rusqlite
https://kb.cert.org/vuls/id/720344
https://linux.oracle.com/cve/CVE-2022-35737.html
https://linux.oracle.com/errata/ELSA-2023-0339.html
https://nvd.nist.gov/vuln/detail/CVE-2022-35737
https://rustsec.org/advisories/RUSTSEC-2022-0090.html
https://security.gentoo.org/glsa/202210-40
https://security.netapp.com/advisory/ntap-20220915-0009
https://security.netapp.com/advisory/ntap-20220915-0009/
https://sqlite.org/releaselog/3_39_2.html
https://ubuntu.com/security/notices/USN-5712-1
https://ubuntu.com/security/notices/USN-5716-1
https://ubuntu.com/security/notices/USN-5716-2
https://www.cve.org/CVERecord?id=CVE-2022-35737
https://www.sqlite.org/cves.html
https://www.sqlite.org/releaselog/3_39_2.html
|
| sqlite |
CVE-2016-6153 |
LOW |
3.7.17-8.el7_7.1 |
|
http://lists.opensuse.org/opensuse-updates/2016-08/msg00053.html
http://www.openwall.com/lists/oss-security/2016/07/01/1
http://www.openwall.com/lists/oss-security/2016/07/01/2
http://www.securityfocus.com/bid/91546
http://www.sqlite.org/cgi/src/info/67985761aa93fb61
https://access.redhat.com/security/cve/CVE-2016-6153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153
https://lists.debian.org/debian-lts-announce/2023/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGQTH7V45QVHFDXJAEECHEO3HHD644WZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
https://nvd.nist.gov/vuln/detail/CVE-2016-6153
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.cve.org/CVERecord?id=CVE-2016-6153
https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt
https://www.sqlite.org/releaselog/3_13_0.html
https://www.tenable.com/security/tns-2016-20
|
| sqlite |
CVE-2017-10989 |
LOW |
3.7.17-8.el7_7.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html
http://marc.info/?l=sqlite-users&m=149933696214713&w=2
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/99502
http://www.securitytracker.com/id/1039427
https://access.redhat.com/security/cve/CVE-2017-10989
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405
https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989
https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2017-10989
https://sqlite.org/src/info/66de6f4a
https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26
https://support.apple.com/HT208112
https://support.apple.com/HT208113
https://support.apple.com/HT208115
https://support.apple.com/HT208144
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.cve.org/CVERecord?id=CVE-2017-10989
|
| sqlite |
CVE-2017-13685 |
LOW |
3.7.17-8.el7_7.1 |
|
http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html
http://www.securityfocus.com/bid/100521
https://access.redhat.com/security/cve/CVE-2017-13685
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685
https://nvd.nist.gov/vuln/detail/CVE-2017-13685
https://ubuntu.com/security/notices/USN-4019-1
https://ubuntu.com/security/notices/USN-4019-2
https://usn.ubuntu.com/4019-1/
https://usn.ubuntu.com/4019-2/
https://www.cve.org/CVERecord?id=CVE-2017-13685
|
| sqlite |
CVE-2017-15286 |
LOW |
3.7.17-8.el7_7.1 |
|
http://www.securityfocus.com/bid/101285
https://access.redhat.com/security/cve/CVE-2017-15286
https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md
https://nvd.nist.gov/vuln/detail/CVE-2017-15286
https://www.cve.org/CVERecord?id=CVE-2017-15286
|
| sqlite |
CVE-2018-8740 |
LOW |
3.7.17-8.el7_7.1 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html
http://www.securityfocus.com/bid/103466
https://access.redhat.com/security/cve/CVE-2018-8740
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964
https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/
https://nvd.nist.gov/vuln/detail/CVE-2018-8740
https://ubuntu.com/security/notices/USN-4205-1
https://ubuntu.com/security/notices/USN-4394-1
https://usn.ubuntu.com/4205-1/
https://usn.ubuntu.com/4394-1/
https://www.cve.org/CVERecord?id=CVE-2018-8740
https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema
https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b
|
| sqlite |
CVE-2019-19244 |
LOW |
3.7.17-8.el7_7.1 |
|
https://access.redhat.com/security/cve/CVE-2019-19244
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244
https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348
https://nvd.nist.gov/vuln/detail/CVE-2019-19244
https://ubuntu.com/security/notices/USN-4205-1
https://usn.ubuntu.com/4205-1/
https://www.cve.org/CVERecord?id=CVE-2019-19244
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| sqlite |
CVE-2020-35525 |
LOW |
3.7.17-8.el7_7.1 |
|
https://access.redhat.com/errata/RHSA-2022:7108
https://access.redhat.com/security/cve/CVE-2020-35525
https://bugzilla.redhat.com/2122324
https://bugzilla.redhat.com/2122329
https://bugzilla.redhat.com/show_bug.cgi?id=2122324
https://bugzilla.redhat.com/show_bug.cgi?id=2122329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35525
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35527
https://errata.almalinux.org/8/ALSA-2022-7108.html
https://errata.rockylinux.org/RLSA-2022:7108
https://linux.oracle.com/cve/CVE-2020-35525.html
https://linux.oracle.com/errata/ELSA-2022-7108.html
https://nvd.nist.gov/vuln/detail/CVE-2020-35525
https://security.netapp.com/advisory/ntap-20230706-0007/
https://ubuntu.com/security/notices/USN-5615-1
https://ubuntu.com/security/notices/USN-5615-2
https://www.cve.org/CVERecord?id=CVE-2020-35525
https://www.sqlite.org/src/info/a67cf5b7d37d5b14
|
| sqlite |
CVE-2021-45346 |
LOW |
3.7.17-8.el7_7.1 |
|
https://access.redhat.com/security/cve/CVE-2021-45346
https://github.com/guyinatuxedo/sqlite3_record_leaking
https://nvd.nist.gov/vuln/detail/CVE-2021-45346
https://security.netapp.com/advisory/ntap-20220303-0001/
https://sqlite.org/forum/forumpost/056d557c2f8c452ed5
https://sqlite.org/forum/forumpost/53de8864ba114bf6
https://www.cve.org/CVERecord?id=CVE-2021-45346
https://www.sqlite.org/cves.html#status_of_recent_sqlite_cves
|
| sqlite |
CVE-2023-36191 |
LOW |
3.7.17-8.el7_7.1 |
|
https://access.redhat.com/security/cve/CVE-2023-36191
https://nvd.nist.gov/vuln/detail/CVE-2023-36191
https://www.cve.org/CVERecord?id=CVE-2023-36191
https://www.sqlite.org/forum/forumpost/19f55ef73b
|
| sqlite |
CVE-2024-0232 |
LOW |
3.7.17-8.el7_7.1 |
|
https://access.redhat.com/security/cve/CVE-2024-0232
https://bugzilla.redhat.com/show_bug.cgi?id=2243754
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/
https://nvd.nist.gov/vuln/detail/CVE-2024-0232
https://www.cve.org/CVERecord?id=CVE-2024-0232
|
| systemd |
CVE-2013-4392 |
MEDIUM |
219-78.el7_9.9 |
|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
|
| systemd |
CVE-2017-18078 |
MEDIUM |
219-78.el7_9.9 |
|
http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
http://www.openwall.com/lists/oss-security/2018/01/29/3
https://access.redhat.com/security/cve/CVE-2017-18078
https://github.com/systemd/systemd/issues/7736
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://nvd.nist.gov/vuln/detail/CVE-2017-18078
https://www.cve.org/CVERecord?id=CVE-2017-18078
https://www.exploit-db.com/exploits/43935/
https://www.openwall.com/lists/oss-security/2018/01/29/4
|
| systemd |
CVE-2018-6954 |
MEDIUM |
219-78.el7_9.9 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
https://access.redhat.com/security/cve/CVE-2018-6954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954
https://github.com/systemd/systemd/issues/7986
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-6954
https://ubuntu.com/security/notices/USN-3816-1
https://ubuntu.com/security/notices/USN-3816-2
https://usn.ubuntu.com/3816-1/
https://usn.ubuntu.com/3816-2/
https://www.cve.org/CVERecord?id=CVE-2018-6954
|
| systemd |
CVE-2019-3842 |
MEDIUM |
219-78.el7_9.9 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html
https://access.redhat.com/security/cve/CVE-2019-3842
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842
https://linux.oracle.com/cve/CVE-2019-3842.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
https://nvd.nist.gov/vuln/detail/CVE-2019-3842
https://ubuntu.com/security/notices/USN-3938-1
https://www.cve.org/CVERecord?id=CVE-2019-3842
https://www.exploit-db.com/exploits/46743/
|
| systemd |
CVE-2020-13529 |
MEDIUM |
219-78.el7_9.9 |
|
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://nvd.nist.gov/vuln/detail/CVE-2020-13529
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.cve.org/CVERecord?id=CVE-2020-13529
|
| systemd |
CVE-2020-13776 |
MEDIUM |
219-78.el7_9.9 |
|
https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
https://www.cve.org/CVERecord?id=CVE-2020-13776
|
| systemd |
CVE-2021-3997 |
MEDIUM |
219-78.el7_9.9 |
|
https://access.redhat.com/security/cve/CVE-2021-3997
https://bugzilla.redhat.com/show_bug.cgi?id=2024639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1
https://nvd.nist.gov/vuln/detail/CVE-2021-3997
https://security.gentoo.org/glsa/202305-15
https://ubuntu.com/security/notices/USN-5226-1
https://www.cve.org/CVERecord?id=CVE-2021-3997
https://www.openwall.com/lists/oss-security/2022/01/10/2
|
| systemd |
CVE-2022-3821 |
MEDIUM |
219-78.el7_9.9 |
|
https://access.redhat.com/errata/RHSA-2023:0336
https://access.redhat.com/security/cve/CVE-2022-3821
https://bugzilla.redhat.com/2139327
https://bugzilla.redhat.com/show_bug.cgi?id=2139327
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3821
https://errata.almalinux.org/9/ALSA-2023-0336.html
https://errata.rockylinux.org/RLSA-2023:0336
https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e
https://github.com/systemd/systemd/issues/23928
https://github.com/systemd/systemd/pull/23933
https://linux.oracle.com/cve/CVE-2022-3821.html
https://linux.oracle.com/errata/ELSA-2023-0336.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00036.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P/
https://nvd.nist.gov/vuln/detail/CVE-2022-3821
https://security.gentoo.org/glsa/202305-15
https://ubuntu.com/security/notices/USN-5928-1
https://www.cve.org/CVERecord?id=CVE-2022-3821
|
| systemd |
CVE-2022-4415 |
MEDIUM |
219-78.el7_9.9 |
|
https://access.redhat.com/errata/RHSA-2023:0954
https://access.redhat.com/security/cve/CVE-2022-4415
https://bugzilla.redhat.com/2149063
https://bugzilla.redhat.com/2155515
https://bugzilla.redhat.com/show_bug.cgi?id=2149063
https://bugzilla.redhat.com/show_bug.cgi?id=2155515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45873
https://errata.almalinux.org/9/ALSA-2023-0954.html
https://errata.rockylinux.org/RLSA-2023:0954
https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
https://linux.oracle.com/cve/CVE-2022-4415.html
https://linux.oracle.com/errata/ELSA-2023-0954.html
https://nvd.nist.gov/vuln/detail/CVE-2022-4415
https://ubuntu.com/security/notices/USN-5928-1
https://www.cve.org/CVERecord?id=CVE-2022-4415
https://www.openwall.com/lists/oss-security/2022/12/21/3
|
| systemd |
CVE-2022-45873 |
MEDIUM |
219-78.el7_9.9 |
|
https://access.redhat.com/errata/RHSA-2023:0954
https://access.redhat.com/security/cve/CVE-2022-45873
https://bugzilla.redhat.com/2149063
https://bugzilla.redhat.com/2155515
https://bugzilla.redhat.com/show_bug.cgi?id=2149063
https://bugzilla.redhat.com/show_bug.cgi?id=2155515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45873
https://errata.almalinux.org/9/ALSA-2023-0954.html
https://errata.rockylinux.org/RLSA-2023:0954
https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
https://linux.oracle.com/cve/CVE-2022-45873.html
https://linux.oracle.com/errata/ELSA-2023-0954.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MS5N5SLYAHKENLAJWYBDKU55ICU3SVZF/
https://nvd.nist.gov/vuln/detail/CVE-2022-45873
https://ubuntu.com/security/notices/USN-5928-1
https://www.cve.org/CVERecord?id=CVE-2022-45873
|
| systemd |
CVE-2023-26604 |
MEDIUM |
219-78.el7_9.9 |
|
http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html
https://access.redhat.com/errata/RHSA-2023:3837
https://access.redhat.com/security/cve/CVE-2023-26604
https://blog.compass-security.com/2012/10/dangerous-sudoers-entries-part-2-insecure-functionality/
https://bugzilla.redhat.com/2175611
https://bugzilla.redhat.com/show_bug.cgi?id=2175611
https://bugzilla.redhat.com/show_bug.cgi?id=2190153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26604
https://errata.almalinux.org/8/ALSA-2023-3837.html
https://errata.rockylinux.org/RLSA-2023:3837
https://github.com/systemd/systemd/blob/main/NEWS#L4335-L4340
https://github.com/systemd/systemd/issues/5666
https://linux.oracle.com/cve/CVE-2023-26604.html
https://linux.oracle.com/errata/ELSA-2023-3837.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00032.html
https://medium.com/%40zenmoviefornotification/saidov-maxim-cve-2023-26604-c1232a526ba7
https://medium.com/@zenmoviefornotification/saidov-maxim-cve-2023-26604-c1232a526ba7
https://nvd.nist.gov/vuln/detail/CVE-2023-26604
https://security.netapp.com/advisory/ntap-20230505-0009/
https://www.cve.org/CVERecord?id=CVE-2023-26604
|
| systemd |
CVE-2016-6349 |
LOW |
219-78.el7_9.9 |
|
http://www.openwall.com/lists/oss-security/2016/07/26/9
http://www.openwall.com/lists/oss-security/2016/10/13/7
http://www.securityfocus.com/bid/92143
https://access.redhat.com/security/cve/CVE-2016-6349
https://bugzilla.redhat.com/show_bug.cgi?id=1360634
https://github.com/projectatomic/oci-register-machine/pull/22
https://nvd.nist.gov/vuln/detail/CVE-2016-6349
https://www.cve.org/CVERecord?id=CVE-2016-6349
|
| systemd-libs |
CVE-2013-4392 |
MEDIUM |
219-78.el7_9.9 |
|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357
http://www.openwall.com/lists/oss-security/2013/10/01/9
https://access.redhat.com/security/cve/CVE-2013-4392
https://bugzilla.redhat.com/show_bug.cgi?id=859060
https://nvd.nist.gov/vuln/detail/CVE-2013-4392
https://www.cve.org/CVERecord?id=CVE-2013-4392
|
| systemd-libs |
CVE-2017-18078 |
MEDIUM |
219-78.el7_9.9 |
|
http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
http://www.openwall.com/lists/oss-security/2018/01/29/3
https://access.redhat.com/security/cve/CVE-2017-18078
https://github.com/systemd/systemd/issues/7736
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://nvd.nist.gov/vuln/detail/CVE-2017-18078
https://www.cve.org/CVERecord?id=CVE-2017-18078
https://www.exploit-db.com/exploits/43935/
https://www.openwall.com/lists/oss-security/2018/01/29/4
|
| systemd-libs |
CVE-2018-6954 |
MEDIUM |
219-78.el7_9.9 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
https://access.redhat.com/security/cve/CVE-2018-6954
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954
https://github.com/systemd/systemd/issues/7986
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2018-6954
https://ubuntu.com/security/notices/USN-3816-1
https://ubuntu.com/security/notices/USN-3816-2
https://usn.ubuntu.com/3816-1/
https://usn.ubuntu.com/3816-2/
https://www.cve.org/CVERecord?id=CVE-2018-6954
|
| systemd-libs |
CVE-2019-3842 |
MEDIUM |
219-78.el7_9.9 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html
http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html
https://access.redhat.com/security/cve/CVE-2019-3842
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842
https://linux.oracle.com/cve/CVE-2019-3842.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/
https://nvd.nist.gov/vuln/detail/CVE-2019-3842
https://ubuntu.com/security/notices/USN-3938-1
https://www.cve.org/CVERecord?id=CVE-2019-3842
https://www.exploit-db.com/exploits/46743/
|
| systemd-libs |
CVE-2020-13529 |
MEDIUM |
219-78.el7_9.9 |
|
http://www.openwall.com/lists/oss-security/2021/08/04/2
http://www.openwall.com/lists/oss-security/2021/08/17/3
http://www.openwall.com/lists/oss-security/2021/09/07/3
https://access.redhat.com/security/cve/CVE-2020-13529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529
https://linux.oracle.com/cve/CVE-2020-13529.html
https://linux.oracle.com/errata/ELSA-2021-4361.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/
https://nvd.nist.gov/vuln/detail/CVE-2020-13529
https://security.gentoo.org/glsa/202107-48
https://security.netapp.com/advisory/ntap-20210625-0005/
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142
https://ubuntu.com/security/notices/USN-5013-1
https://ubuntu.com/security/notices/USN-5013-2
https://www.cve.org/CVERecord?id=CVE-2020-13529
|
| systemd-libs |
CVE-2020-13776 |
MEDIUM |
219-78.el7_9.9 |
|
https://access.redhat.com/security/cve/CVE-2020-13776
https://github.com/systemd/systemd/issues/15985
https://linux.oracle.com/cve/CVE-2020-13776.html
https://linux.oracle.com/errata/ELSA-2021-1611.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/
https://nvd.nist.gov/vuln/detail/CVE-2020-13776
https://security.netapp.com/advisory/ntap-20200611-0003/
https://www.cve.org/CVERecord?id=CVE-2020-13776
|
| systemd-libs |
CVE-2021-3997 |
MEDIUM |
219-78.el7_9.9 |
|
https://access.redhat.com/security/cve/CVE-2021-3997
https://bugzilla.redhat.com/show_bug.cgi?id=2024639
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997
https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1
https://nvd.nist.gov/vuln/detail/CVE-2021-3997
https://security.gentoo.org/glsa/202305-15
https://ubuntu.com/security/notices/USN-5226-1
https://www.cve.org/CVERecord?id=CVE-2021-3997
https://www.openwall.com/lists/oss-security/2022/01/10/2
|
| systemd-libs |
CVE-2022-3821 |
MEDIUM |
219-78.el7_9.9 |
|
https://access.redhat.com/errata/RHSA-2023:0336
https://access.redhat.com/security/cve/CVE-2022-3821
https://bugzilla.redhat.com/2139327
https://bugzilla.redhat.com/show_bug.cgi?id=2139327
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3821
https://errata.almalinux.org/9/ALSA-2023-0336.html
https://errata.rockylinux.org/RLSA-2023:0336
https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e
https://github.com/systemd/systemd/issues/23928
https://github.com/systemd/systemd/pull/23933
https://linux.oracle.com/cve/CVE-2022-3821.html
https://linux.oracle.com/errata/ELSA-2023-0336.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00036.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RVBQC2VLSDVQAPJTEMTREXDL4HYLXG2P/
https://nvd.nist.gov/vuln/detail/CVE-2022-3821
https://security.gentoo.org/glsa/202305-15
https://ubuntu.com/security/notices/USN-5928-1
https://www.cve.org/CVERecord?id=CVE-2022-3821
|
| systemd-libs |
CVE-2022-4415 |
MEDIUM |
219-78.el7_9.9 |
|
https://access.redhat.com/errata/RHSA-2023:0954
https://access.redhat.com/security/cve/CVE-2022-4415
https://bugzilla.redhat.com/2149063
https://bugzilla.redhat.com/2155515
https://bugzilla.redhat.com/show_bug.cgi?id=2149063
https://bugzilla.redhat.com/show_bug.cgi?id=2155515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45873
https://errata.almalinux.org/9/ALSA-2023-0954.html
https://errata.rockylinux.org/RLSA-2023:0954
https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
https://linux.oracle.com/cve/CVE-2022-4415.html
https://linux.oracle.com/errata/ELSA-2023-0954.html
https://nvd.nist.gov/vuln/detail/CVE-2022-4415
https://ubuntu.com/security/notices/USN-5928-1
https://www.cve.org/CVERecord?id=CVE-2022-4415
https://www.openwall.com/lists/oss-security/2022/12/21/3
|
| systemd-libs |
CVE-2022-45873 |
MEDIUM |
219-78.el7_9.9 |
|
https://access.redhat.com/errata/RHSA-2023:0954
https://access.redhat.com/security/cve/CVE-2022-45873
https://bugzilla.redhat.com/2149063
https://bugzilla.redhat.com/2155515
https://bugzilla.redhat.com/show_bug.cgi?id=2149063
https://bugzilla.redhat.com/show_bug.cgi?id=2155515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4415
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45873
https://errata.almalinux.org/9/ALSA-2023-0954.html
https://errata.rockylinux.org/RLSA-2023:0954
https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
https://linux.oracle.com/cve/CVE-2022-45873.html
https://linux.oracle.com/errata/ELSA-2023-0954.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MS5N5SLYAHKENLAJWYBDKU55ICU3SVZF/
https://nvd.nist.gov/vuln/detail/CVE-2022-45873
https://ubuntu.com/security/notices/USN-5928-1
https://www.cve.org/CVERecord?id=CVE-2022-45873
|
| systemd-libs |
CVE-2023-26604 |
MEDIUM |
219-78.el7_9.9 |
|
http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html
https://access.redhat.com/errata/RHSA-2023:3837
https://access.redhat.com/security/cve/CVE-2023-26604
https://blog.compass-security.com/2012/10/dangerous-sudoers-entries-part-2-insecure-functionality/
https://bugzilla.redhat.com/2175611
https://bugzilla.redhat.com/show_bug.cgi?id=2175611
https://bugzilla.redhat.com/show_bug.cgi?id=2190153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26604
https://errata.almalinux.org/8/ALSA-2023-3837.html
https://errata.rockylinux.org/RLSA-2023:3837
https://github.com/systemd/systemd/blob/main/NEWS#L4335-L4340
https://github.com/systemd/systemd/issues/5666
https://linux.oracle.com/cve/CVE-2023-26604.html
https://linux.oracle.com/errata/ELSA-2023-3837.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00032.html
https://medium.com/%40zenmoviefornotification/saidov-maxim-cve-2023-26604-c1232a526ba7
https://medium.com/@zenmoviefornotification/saidov-maxim-cve-2023-26604-c1232a526ba7
https://nvd.nist.gov/vuln/detail/CVE-2023-26604
https://security.netapp.com/advisory/ntap-20230505-0009/
https://www.cve.org/CVERecord?id=CVE-2023-26604
|
| systemd-libs |
CVE-2016-6349 |
LOW |
219-78.el7_9.9 |
|
http://www.openwall.com/lists/oss-security/2016/07/26/9
http://www.openwall.com/lists/oss-security/2016/10/13/7
http://www.securityfocus.com/bid/92143
https://access.redhat.com/security/cve/CVE-2016-6349
https://bugzilla.redhat.com/show_bug.cgi?id=1360634
https://github.com/projectatomic/oci-register-machine/pull/22
https://nvd.nist.gov/vuln/detail/CVE-2016-6349
https://www.cve.org/CVERecord?id=CVE-2016-6349
|
| tar |
CVE-2005-2541 |
MEDIUM |
2:1.26-35.el7 |
|
http://marc.info/?l=bugtraq&m=112327628230258&w=2
https://access.redhat.com/security/cve/CVE-2005-2541
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2005-2541
https://www.cve.org/CVERecord?id=CVE-2005-2541
|
| tar |
CVE-2016-6321 |
MEDIUM |
2:1.26-35.el7 |
|
http://git.savannah.gnu.org/cgit/tar.git/commit/?id=7340f67b9860ea0531c1450e5aa261c50f67165d
http://lists.gnu.org/archive/html/bug-tar/2016-10/msg00016.html
http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html
http://seclists.org/fulldisclosure/2016/Oct/102
http://seclists.org/fulldisclosure/2016/Oct/96
http://www.debian.org/security/2016/dsa-3702
http://www.securityfocus.com/bid/93937
http://www.ubuntu.com/usn/USN-3132-1
https://access.redhat.com/security/cve/CVE-2016-6321
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6321
https://security.gentoo.org/glsa/201611-19
https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt
https://sintonen.fi/advisories/tar-extract-pathname-bypass.txt
https://ubuntu.com/security/notices/USN-3132-1
https://www.cve.org/CVERecord?id=CVE-2016-6321
|
| tar |
CVE-2022-48303 |
MEDIUM |
2:1.26-35.el7 |
|
https://access.redhat.com/errata/RHSA-2023:0959
https://access.redhat.com/security/cve/CVE-2022-48303
https://bugzilla.redhat.com/2149722
https://bugzilla.redhat.com/show_bug.cgi?id=2149722
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48303
https://errata.almalinux.org/9/ALSA-2023-0959.html
https://errata.rockylinux.org/RLSA-2023:0959
https://linux.oracle.com/cve/CVE-2022-48303.html
https://linux.oracle.com/errata/ELSA-2023-0959.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/
https://nvd.nist.gov/vuln/detail/CVE-2022-48303
https://savannah.gnu.org/bugs/?62387
https://savannah.gnu.org/patch/?10307
https://ubuntu.com/security/notices/USN-5900-1
https://ubuntu.com/security/notices/USN-5900-2
https://www.cve.org/CVERecord?id=CVE-2022-48303
|
| tar |
CVE-2018-20482 |
LOW |
2:1.26-35.el7 |
|
http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454
http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://www.securityfocus.com/bid/106354
https://access.redhat.com/security/cve/CVE-2018-20482
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20482
https://lists.debian.org/debian-lts-announce/2018/12/msg00023.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00025.html
https://news.ycombinator.com/item?id=18745431
https://nvd.nist.gov/vuln/detail/CVE-2018-20482
https://security.gentoo.org/glsa/201903-05
https://twitter.com/thatcks/status/1076166645708668928
https://ubuntu.com/security/notices/USN-4692-1
https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug
https://www.cve.org/CVERecord?id=CVE-2018-20482
|
| tar |
CVE-2019-9923 |
LOW |
2:1.26-35.el7 |
|
http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html
http://savannah.gnu.org/bugs/?55369
https://access.redhat.com/security/cve/CVE-2019-9923
https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-9923
https://ubuntu.com/security/notices/USN-4692-1
https://www.cve.org/CVERecord?id=CVE-2019-9923
|
| tar |
CVE-2021-20193 |
LOW |
2:1.26-35.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-20193
https://bugzilla.redhat.com/show_bug.cgi?id=1917565
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777
https://nvd.nist.gov/vuln/detail/CVE-2021-20193
https://savannah.gnu.org/bugs/?59897
https://security.gentoo.org/glsa/202105-29
https://ubuntu.com/security/notices/USN-5329-1
https://www.cve.org/CVERecord?id=CVE-2021-20193
|
| tar |
CVE-2023-39804 |
LOW |
2:1.26-35.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-39804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39804
https://git.savannah.gnu.org/cgit/tar.git/commit/?id=a339f05cd269013fa133d2f148d73f6f7d4247e4
https://nvd.nist.gov/vuln/detail/CVE-2023-39804
https://ubuntu.com/security/notices/USN-6543-1
https://www.cve.org/CVERecord?id=CVE-2023-39804
|
| tomcat |
CVE-2014-0186 |
HIGH |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://www.osvdb.org/108060
https://access.redhat.com/security/cve/CVE-2014-0186
https://bugzilla.redhat.com/show_bug.cgi?id=1089884
https://linux.oracle.com/cve/CVE-2014-0186.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://nvd.nist.gov/vuln/detail/CVE-2014-0186
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://security-tracker.debian.org/tracker/CVE-2014-0186
https://www.cve.org/CVERecord?id=CVE-2014-0186
|
| tomcat |
CVE-2016-5425 |
HIGH |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
http://legalhackers.com/advisories/Tomcat-RedHat-based-Root-Privilege-Escalation-Exploit.txt
http://packetstormsecurity.com/files/139041/Apache-Tomcat-8-7-6-Privilege-Escalation.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://www.openwall.com/lists/oss-security/2016/10/10/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93472
http://www.securitytracker.com/id/1036979
https://access.redhat.com/security/cve/CVE-2016-5425
https://linux.oracle.com/cve/CVE-2016-5425.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d%40%3Cissues.activemq.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-5425
https://www.cve.org/CVERecord?id=CVE-2016-5425
https://www.exploit-db.com/exploits/40488/
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat |
CVE-2016-8745 |
HIGH |
7.0.42-4.el7 |
7.0.69-11.el7_3 |
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-0527.html
http://www.debian.org/security/2017/dsa-3754
http://www.debian.org/security/2017/dsa-3755
http://www.openwall.com/lists/oss-security/2016/12/12/1
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/94828
http://www.securitytracker.com/id/1037432
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:0935
https://access.redhat.com/security/cve/CVE-2016-8745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/143bb466cf96a89e791b7db5626055ea819dad89
https://github.com/apache/tomcat/commit/16a57bc885e212839f1d717b94b01d154a36943a
https://github.com/apache/tomcat/commit/cbc9b18a845d3c8c053ac293dffda6c6c19dd92b
https://github.com/apache/tomcat80/commit/3dd2fec73e0de1edc1d3eb1c52a01255fdfc84e7
https://linux.oracle.com/cve/CVE-2016-8745.html
https://linux.oracle.com/errata/ELSA-2017-0935.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/4113c05d37f37c12b8033205684f04033c5f7a9bae117d4af23b32b4%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/4113c05d37f37c12b8033205684f04033c5f7a9bae117d4af23b32b4@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8745
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180607-0002
https://security.netapp.com/advisory/ntap-20180607-0002/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9
https://ubuntu.com/security/notices/USN-3177-1
https://web.archive.org/web/20200227165932/http://www.securityfocus.com/bid/94828
https://web.archive.org/web/20200517114357/http://www.securitytracker.com/id/1037432
https://www.cve.org/CVERecord?id=CVE-2016-8745
|
| tomcat |
CVE-2017-12615 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html
http://www.securityfocus.com/bid/100901
http://www.securitytracker.com/id/1039392
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/security/cve/CVE-2017-12615
https://github.com/advisories/GHSA-pjfr-qf3p-3q25
https://github.com/breaktoprotect/CVE-2017-12615
https://linux.oracle.com/cve/CVE-2017-12615.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-12615
https://security.netapp.com/advisory/ntap-20171018-0001
https://security.netapp.com/advisory/ntap-20171018-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
https://www.cve.org/CVERecord?id=CVE-2017-12615
https://www.exploit-db.com/exploits/42953
https://www.exploit-db.com/exploits/42953/
https://www.synology.com/support/security/Synology_SA_17_54_Tomcat
|
| tomcat |
CVE-2017-12617 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/100954
http://www.securitytracker.com/id/1039552
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2018:0268
https://access.redhat.com/errata/RHSA-2018:0269
https://access.redhat.com/errata/RHSA-2018:0270
https://access.redhat.com/errata/RHSA-2018:0271
https://access.redhat.com/errata/RHSA-2018:0275
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/security/cve/CVE-2017-12617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12617
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/24aea94807f940ee44aa550378dc903289039ddd
https://github.com/apache/tomcat/commit/31e99502e2c602449a2f8835bd23ade772b77333
https://github.com/apache/tomcat/commit/327e8a6644e188764325a013aa2725a60f1b37e5
https://github.com/apache/tomcat/commit/46dfedbc0523d7182be97f4244d7b6c942164485
https://github.com/apache/tomcat/commit/4cf7dab88282c8f3c92f0b961cdb0096e1d63e88
https://github.com/apache/tomcat/commit/506d862e7edfa991de198e0f2e4c4540830fa531
https://github.com/apache/tomcat/commit/512a3c3aecdb52de092c6bacddd71b85c4feda06
https://github.com/apache/tomcat/commit/74ad0e216c791454a318c1811300469eedc5c6f3
https://github.com/apache/tomcat/commit/a9dd96046d7acb0357c6b7b9e6cc70d186fae663
https://github.com/apache/tomcat/commit/b577f9a7996b92b650b1649af3c3bae11c120db9
https://github.com/apache/tomcat/commit/b7e0435d17aba69f16ae9e8a78ad0f1565b552af
https://github.com/apache/tomcat/commit/bbcbb749c75056a2781f37038d63e646fe972104
https://github.com/apache/tomcat/commit/c177e9668d1278710bdb14c0eb8d2702b3655f5a
https://github.com/apache/tomcat/commit/cf0b37beb0622abdf24acc7110daf883f3fe4f95
https://github.com/apache/tomcat/commit/d5b170705d24c386d76038e5989045c89795c28c
https://github.com/apache/tomcat/commit/e650cf1b83e441dbd3863f3f6b61c972cafce19e
https://github.com/apache/tomcat/commit/f1b85da754c4760787d68a99e839b50878140b57
https://github.com/apache/tomcat/commit/fd52f8601170b91f9d7162510e54563e5bf6bdfe
https://linux.oracle.com/cve/CVE-2017-12617.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2017-12617
https://security.netapp.com/advisory/ntap-20171018-0002
https://security.netapp.com/advisory/ntap-20171018-0002/
https://security.netapp.com/advisory/ntap-20180117-0002
https://security.netapp.com/advisory/ntap-20180117-0002/
https://support.f5.com/csp/article/K53173544
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03812en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20171110171954/http://www.securityfocus.com/bid/100954
https://web.archive.org/web/20201209024734/http://www.securitytracker.com/id/1039552
https://www.alphabot.com/security/blog/2017/java/Apache-Tomcat-RCE-CVE-2017-12617.html
https://www.cve.org/CVERecord?id=CVE-2017-12617
https://www.exploit-db.com/exploits/42966
https://www.exploit-db.com/exploits/42966/
https://www.exploit-db.com/exploits/43008
https://www.exploit-db.com/exploits/43008/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| tomcat |
CVE-2017-5647 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.arubanetworks.com/assets/alert/HPESBHF03730.txt
http://www.debian.org/security/2017/dsa-3842
http://www.debian.org/security/2017/dsa-3843
http://www.openwall.com/lists/oss-security/2017/04/10/24
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.securitytracker.com/id/1038218
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/security/cve/CVE-2017-5647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/864aa1199ad2cccc9a7e7c6b977f7d7f812c9910
https://github.com/apache/tomcat/commit/a4efd3ca1ccbdfc398136d76c0d8b7ad5a1e4905
https://github.com/apache/tomcat/commit/f5e06b8c743b1daa9eb5e817863958b6b320e044
https://github.com/apache/tomcat80/commit/ec10b8c785d1db91fe58946436f854dde04410fd
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03730en_us
https://linux.oracle.com/cve/CVE-2017-5647.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5796678c5a773c6f3ff57c178ac247d85ceca0dee9190ba48171451a%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5796678c5a773c6f3ff57c178ac247d85ceca0dee9190ba48171451a@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5647
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180614-0001
https://security.netapp.com/advisory/ntap-20180614-0001/
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170420114447/http://www.securitytracker.com/id/1038218
https://www.cve.org/CVERecord?id=CVE-2017-5647
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat |
CVE-2017-5664 |
HIGH |
7.0.42-4.el7 |
7.0.69-12.el7_3 |
http://apt.inguza.net/wheezy-security/tomcat/tomcat8-CVE-2017-5664.patch
http://www.debian.org/security/2017/dsa-3891
http://www.debian.org/security/2017/dsa-3892
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/98888
http://www.securitytracker.com/id/1038641
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:1809
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/errata/RHSA-2017:2633
https://access.redhat.com/errata/RHSA-2017:2635
https://access.redhat.com/errata/RHSA-2017:2636
https://access.redhat.com/errata/RHSA-2017:2637
https://access.redhat.com/errata/RHSA-2017:2638
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/security/cve/CVE-2017-5664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/29893e66111d33cfe99dd01cb146317c0c262ef4
https://github.com/apache/tomcat/commit/3242efea525df01d15da6e90ea69a9a21b10b454
https://github.com/apache/tomcat/commit/3bfe9fb886598c4d8ecbe674216152006bbce456
https://github.com/apache/tomcat/commit/4545dcce444aa619374a659cb450dbbd0be3c921
https://github.com/apache/tomcat/commit/58b32048ce25cb812ae394dafb0cd57254c68155
https://github.com/apache/tomcat/commit/7d93527254d9e9371b342800617f20d13c8b85ad
https://github.com/apache/tomcat80/commit/25d3c0d93190ef165ecd6c744bc15b5059abfa8f
https://github.com/apache/tomcat80/commit/e070a31ec81b56377822e44883c64abb41f36a3b
https://linux.oracle.com/cve/CVE-2017-5664.html
https://linux.oracle.com/errata/ELSA-2017-3080.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5664
https://security.netapp.com/advisory/ntap-20171019-0002
https://security.netapp.com/advisory/ntap-20171019-0002/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.78
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.44
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.15
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170801120345/http://www.securitytracker.com/id/1038641
https://web.archive.org/web/20170805032345/http://www.securityfocus.com/bid/98888
https://www.cve.org/CVERecord?id=CVE-2017-5664
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat |
CVE-2018-1336 |
HIGH |
7.0.42-4.el7 |
7.0.76-8.el7_5 |
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090435.GA60759%40minotaur.apache.org%3E
http://www.securityfocus.com/bid/104898
http://www.securitytracker.com/id/1041375
https://access.redhat.com/errata/RHEA-2018:2188
https://access.redhat.com/errata/RHEA-2018:2189
https://access.redhat.com/errata/RHSA-2018:2700
https://access.redhat.com/errata/RHSA-2018:2701
https://access.redhat.com/errata/RHSA-2018:2740
https://access.redhat.com/errata/RHSA-2018:2741
https://access.redhat.com/errata/RHSA-2018:2742
https://access.redhat.com/errata/RHSA-2018:2743
https://access.redhat.com/errata/RHSA-2018:2921
https://access.redhat.com/errata/RHSA-2018:2930
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2018:2945
https://access.redhat.com/errata/RHSA-2018:3768
https://access.redhat.com/security/cve/CVE-2018-1336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1336
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/156d76a6afeef440d14044a560d6ad1d029361c4
https://github.com/apache/tomcat/commit/92cd494555598e99dd691712e8ee426a2f9c2e93
https://github.com/apache/tomcat/commit/e00812b94e5830b2be3de04f4ae4ade38a700074
https://github.com/apache/tomcat80/commit/9e9b7fe1b5732277a26e437f1d32155de6208ef2
https://linux.oracle.com/cve/CVE-2018-1336.html
https://linux.oracle.com/errata/ELSA-2018-2921.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1336
https://security.netapp.com/advisory/ntap-20180817-0001
https://security.netapp.com/advisory/ntap-20180817-0001/
https://support.f5.com/csp/article/K73008537?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K73008537?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3723-1
https://usn.ubuntu.com/3723-1
https://usn.ubuntu.com/3723-1/
https://web.archive.org/web/20190703075545/http://www.securitytracker.com/id/1041375
https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104898
https://www.cve.org/CVERecord?id=CVE-2018-1336
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| tomcat |
CVE-2020-13935 |
HIGH |
7.0.42-4.el7 |
7.0.76-15.el7 |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3C39e4200c-6f4e-b85d-fe4b-a9c2bd5fdc3d%40apache.org%3E
http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37
https://access.redhat.com/security/cve/CVE-2020-13935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/12d715676038efbf9c728af10163f8277fc019d5
https://github.com/apache/tomcat/commit/1c1c77b0efb667cea80b532440b44cea1dc427c3
https://github.com/apache/tomcat/commit/40fa74c74822711ab878079d0a69f7357926723d
https://github.com/apache/tomcat/commit/4c04982870d6e730c38e21e58fb653b7cf723784
https://github.com/apache/tomcat/commit/f9f75c14678b68633f79030ddf4ff827f014cc84
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-13935.html
https://linux.oracle.com/errata/ELSA-2020-4004.html
https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2020-13935
https://security.netapp.com/advisory/ntap-20200724-0003
https://security.netapp.com/advisory/ntap-20200724-0003/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4448-1
https://ubuntu.com/security/notices/USN-4596-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://usn.ubuntu.com/4596-1
https://usn.ubuntu.com/4596-1/
https://www.cve.org/CVERecord?id=CVE-2020-13935
https://www.debian.org/security/2020/dsa-4727
https://www.openwall.com/lists/oss-security/2020/07/14/3
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat |
CVE-2020-1938 |
HIGH |
7.0.42-4.el7 |
7.0.76-11.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html
http://support.blackberry.com/kb/articleDetail?articleNumber=000062739
https://access.redhat.com/security/cve/CVE-2020-1938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1938
https://linux.oracle.com/cve/CVE-2020-1938.html
https://linux.oracle.com/errata/ELSA-2020-0912.html
https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a%40%3Cusers.tomee.apache.org%3E
https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a@%3Cusers.tomee.apache.org%3E
https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7%40%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E
https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3@%3Ccommits.tomee.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B
https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/
https://nvd.nist.gov/vuln/detail/CVE-2020-1938
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20200226-0002
https://security.netapp.com/advisory/ntap-20200226-0002/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31
https://www.cnvd.org.cn/webinfo/show/5415
https://www.cve.org/CVERecord?id=CVE-2020-1938
https://www.debian.org/security/2020/dsa-4673
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487
|
| tomcat |
CVE-2020-9484 |
HIGH |
7.0.42-4.el7 |
7.0.76-12.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202005.mbox/%3Ce3a0a517-bf82-ba62-0af6-24b83ea0e4e2%40apache.org%3E
http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html
http://seclists.org/fulldisclosure/2020/Jun/6
http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M5
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.104
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.55
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.35
http://www.openwall.com/lists/oss-security/2021/03/01/2
https://access.redhat.com/security/cve/CVE-2020-9484
https://bugzilla.suse.com/show_bug.cgi?id=1171928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222 (9.0.35)
https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222.patch
https://github.com/apache/tomcat/commit/4785433a226a20df6acbea49296e1ce7e23de453
https://github.com/apache/tomcat/commit/53e30390943c18fca0c9e57dbcc14f1c623cfd06 (7.0.104)
https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4
https://github.com/apache/tomcat/commit/74b105657ffbd1d1de80455f03446c3bbf30d1f5
https://github.com/apache/tomcat/commit/93f0cc403a9210d469afc2bd9cf03ab3251c6f35
https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b
https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b (10.0.0-M5)
https://github.com/apache/tomcat/commit/ec08af18d0f9ddca3f2d800ef66fe7fd20afef2f (8.5.55)
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-9484.html
https://linux.oracle.com/errata/ELSA-2020-2530.html
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/05/msg00020.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N
https://nvd.nist.gov/vuln/detail/CVE-2020-9484
https://security.gentoo.org/glsa/202006-21
https://security.netapp.com/advisory/ntap-20200528-0005
https://security.netapp.com/advisory/ntap-20200528-0005/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4448-1
https://ubuntu.com/security/notices/USN-4596-1
https://ubuntu.com/security/notices/USN-5360-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://usn.ubuntu.com/4596-1
https://usn.ubuntu.com/4596-1/
https://www.cve.org/CVERecord?id=CVE-2020-9484
https://www.debian.org/security/2020/dsa-4727
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat |
CVE-2023-34981 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-34981
https://bz.apache.org/bugzilla/show_bug.cgi?id=66512
https://bz.apache.org/bugzilla/show_bug.cgi?id=66591
https://github.com/advisories/GHSA-mppv-79ch-vw6q
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2214c8030522aa9b2a367dfa5d9acff1a03666ae
https://github.com/apache/tomcat/commit/2f0ca2378415f4cf0748f4bc8fa955f41f803fa5
https://github.com/apache/tomcat/commit/739c7381aed22b7636351caf885ddc519ab6b442
https://github.com/apache/tomcat/commit/f0742f47b98aca943097f7f88e0d1163f57527e3
https://lists.apache.org/thread/j1ksjh9m9gx1q60rtk1sbzmxhvj5h5qz
https://nvd.nist.gov/vuln/detail/CVE-2023-34981
https://security.netapp.com/advisory/ntap-20230714-0003
https://security.netapp.com/advisory/ntap-20230714-0003/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-34981
|
| tomcat |
CVE-2023-46589 |
HIGH |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/11/28/2
https://access.redhat.com/errata/RHSA-2024:1134
https://access.redhat.com/security/cve/CVE-2023-46589
https://bugzilla.redhat.com/2252050
https://bugzilla.redhat.com/show_bug.cgi?id=2252050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46589
https://errata.almalinux.org/9/ALSA-2024-1134.html
https://errata.rockylinux.org/RLSA-2024:0539
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6f181e1062a472bc5f0234980f66cbde42c1041b
https://github.com/apache/tomcat/commit/7a2d8818fcea0b51747a67af9510ce7977245ebd
https://github.com/apache/tomcat/commit/aa92971e879a519384c517febc39fd04c48d4642
https://github.com/apache/tomcat/commit/b5776d769bffeade865061bc8ecbeb2b56167b08
https://linux.oracle.com/cve/CVE-2023-46589.html
https://linux.oracle.com/errata/ELSA-2024-1134.html
https://lists.apache.org/thread/0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr
https://lists.debian.org/debian-lts-announce/2024/01/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2023-46589
https://security.netapp.com/advisory/ntap-20231214-0009
https://security.netapp.com/advisory/ntap-20231214-0009/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-46589
https://www.openwall.com/lists/oss-security/2023/11/28/2
|
| tomcat |
CVE-2024-23672 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-23672
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0052b374684b613b0c849899b325ebe334ac6501
https://github.com/apache/tomcat/commit/3631adb1342d8bbd8598802a12b63ad02c37d591
https://github.com/apache/tomcat/commit/52d6650e062d880704898d7d8c1b2b7a3efe8068
https://github.com/apache/tomcat/commit/b0e3b1bd78de270d53e319d7cb79eb282aa53cb9
https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f
https://nvd.nist.gov/vuln/detail/CVE-2024-23672
https://www.cve.org/CVERecord?id=CVE-2024-23672
|
| tomcat |
CVE-2024-24549 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-24549
https://lists.apache.org/thread/4c50rmomhbbsdgfjsgwlb51xdwfjdcvg
https://nvd.nist.gov/vuln/detail/CVE-2024-24549
https://www.cve.org/CVERecord?id=CVE-2024-24549
|
| tomcat |
CVE-2013-4286 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://advisories.mageia.org/MGASA-2014-0148.html
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2014-0343.html
http://rhn.redhat.com/errata/RHSA-2014-0344.html
http://rhn.redhat.com/errata/RHSA-2014-0345.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/57675
http://secunia.com/advisories/59036
http://secunia.com/advisories/59675
http://secunia.com/advisories/59722
http://secunia.com/advisories/59724
http://secunia.com/advisories/59733
http://secunia.com/advisories/59873
http://svn.apache.org/viewvc?view=revision&revision=1521829
http://svn.apache.org/viewvc?view=revision&revision=1521854
http://svn.apache.org/viewvc?view=revision&revision=1552565
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21667883
http://www-01.ibm.com/support/docview.wss?uid=swg21675886
http://www-01.ibm.com/support/docview.wss?uid=swg21677147
http://www-01.ibm.com/support/docview.wss?uid=swg21678113
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65773
http://www.ubuntu.com/usn/USN-2130-1
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2013-4286
https://bugzilla.redhat.com/show_bug.cgi?id=1069921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/41b90b6ebc3e7f898a5a87d197ddf63790d33315
https://github.com/apache/tomcat/commit/7c040003f1387795356605566be7870cf70e05dc
https://github.com/apache/tomcat/commit/bcce3e4997a4ed06fe03e2517443f3ad8ade2dfa
https://github.com/apache/tomcat/commit/d0b3e252eb168fafbfb4c3efc16d4192fc8fad6c
https://github.com/apache/tomcat80/commit/ff00954b78e6484e40f323c0cef2e6d95c2882b9
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2013-4286.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-4286
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://ubuntu.com/security/notices/USN-2130-1
https://web.archive.org/web/20140724174205/http://secunia.com/advisories/57675
https://web.archive.org/web/20140804172142/http://secunia.com/advisories/59036
https://web.archive.org/web/20141230041748/http://seclists.org/fulldisclosure/2014/Dec/23
https://web.archive.org/web/20160317145515/http://www.securityfocus.com/archive/1/534161/100/0/threaded
https://web.archive.org/web/20160729061926/http://www.securityfocus.com/bid/65773
https://web.archive.org/web/20161014054543/http://www-01.ibm.com/support/docview.wss?uid=swg21678231
https://web.archive.org/web/20161014054838/http://www-01.ibm.com/support/docview.wss?uid=swg21677147
https://web.archive.org/web/20161014054913/http://www-01.ibm.com/support/docview.wss?uid=swg21678113
https://web.archive.org/web/20161014054948/http://www-01.ibm.com/support/docview.wss?uid=swg21667883
https://web.archive.org/web/20161024215453/http://secunia.com/advisories/59873
https://web.archive.org/web/20161024215639/http://secunia.com/advisories/59722
https://web.archive.org/web/20161024215804/http://secunia.com/advisories/59675
https://web.archive.org/web/20161024220018/http://secunia.com/advisories/59724
https://web.archive.org/web/20161024220034/http://secunia.com/advisories/59733
https://www.cve.org/CVERecord?id=CVE-2013-4286
|
| tomcat |
CVE-2013-4322 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://advisories.mageia.org/MGASA-2014-0148.html
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/59036
http://secunia.com/advisories/59675
http://secunia.com/advisories/59722
http://secunia.com/advisories/59724
http://secunia.com/advisories/59873
http://svn.apache.org/viewvc?view=revision&revision=1521834
http://svn.apache.org/viewvc?view=revision&revision=1521864
http://svn.apache.org/viewvc?view=revision&revision=1549522
http://svn.apache.org/viewvc?view=revision&revision=1549523
http://svn.apache.org/viewvc?view=revision&revision=1556540
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21667883
http://www-01.ibm.com/support/docview.wss?uid=swg21675886
http://www-01.ibm.com/support/docview.wss?uid=swg21677147
http://www-01.ibm.com/support/docview.wss?uid=swg21678113
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65767
http://www.ubuntu.com/usn/USN-2130-1
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2013-4322
https://bugzilla.redhat.com/show_bug.cgi?id=1069905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/70dc3b279f7c99136c2c51bce8812508b4893c8b
https://github.com/apache/tomcat/commit/72613a0e2f88af789c2acc7093c82ff02b95b6d1
https://github.com/apache/tomcat/commit/a91516b80deaf1d0c6e04a7931765fdac34c4ccd
https://github.com/apache/tomcat/commit/b8cb9f5f91e9210ca107fd80f3e6acd47531daa7
https://github.com/apache/tomcat/commit/bed3a1a0d06a3c787183c6e90f326bbe17e49dd4
https://github.com/apache/tomcat/commit/d6a9898125f34e593de426e8c7dabb0f224fc00f
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2013-4322.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-4322
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://ubuntu.com/security/notices/USN-2130-1
https://web.archive.org/web/20140315211337/http://www.securityfocus.com/bid/65767
https://web.archive.org/web/20150503090027/http://www.securityfocus.com/archive/1/534161/100/0/threaded
https://web.archive.org/web/20151023203543/http://secunia.com/advisories/59873
https://web.archive.org/web/20161024215620/http://secunia.com/advisories/59036
https://web.archive.org/web/20161024215639/http://secunia.com/advisories/59722
https://web.archive.org/web/20161024215804/http://secunia.com/advisories/59675
https://web.archive.org/web/20161024220018/http://secunia.com/advisories/59724
https://www.cve.org/CVERecord?id=CVE-2013-4322
|
| tomcat |
CVE-2014-0075 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/59121
http://secunia.com/advisories/59616
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://secunia.com/advisories/60793
http://svn.apache.org/viewvc?view=revision&revision=1578337
http://svn.apache.org/viewvc?view=revision&revision=1578341
http://svn.apache.org/viewvc?view=revision&revision=1579262
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21680603
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.novell.com/support/kb/doc.php?id=7010166
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67671
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/b6974571c122f6a1e7ec74a90fa212976fa7b0ed
https://github.com/apache/tomcat/commit/f646a5acd5e32d6f5a2d9bf1d94ca66b65477675
https://github.com/apache/tomcat80/commit/d49a03728ac7e3c800b1b0ce0eeccd8a5a21bb91
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0075.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0075
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0075
|
| tomcat |
CVE-2014-0099 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/138
http://seclists.org/fulldisclosure/2014/May/140
http://secunia.com/advisories/59121
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://secunia.com/advisories/60793
http://svn.apache.org/viewvc?view=revision&revision=1578812
http://svn.apache.org/viewvc?view=revision&revision=1578814
http://svn.apache.org/viewvc?view=revision&revision=1580473
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21680603
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.securityfocus.com/archive/1/532218/100/0/threaded
http://www.securityfocus.com/archive/1/532221/100/0/threaded
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67668
http://www.securitytracker.com/id/1030302
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/184cdc0d3f03f5737e12d21fff246d7285034597
https://github.com/apache/tomcat/commit/fffd63a3bd3a5475379b7c074820a5463b7663b3
https://github.com/apache/tomcat80/commit/990de53ab923c126f7402090a4ca53df4bb80cbd
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0099.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0099
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0099
|
| tomcat |
CVE-2014-0227 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-2.el7_1 |
http://advisories.mageia.org/MGASA-2015-0081.html
http://archives.neohapsis.com/archives/bugtraq/2015-02/0067.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=143393515412274&w=2
http://marc.info/?l=bugtraq&m=143403519711434&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://rhn.redhat.com/errata/RHSA-2015-0983.html
http://rhn.redhat.com/errata/RHSA-2015-0991.html
http://svn.apache.org/viewvc?view=revision&revision=1600984
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/72717
http://www.securitytracker.com/id/1032791
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/security/cve/CVE-2014-0227
https://bugzilla.redhat.com/show_bug.cgi?id=1109196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227
https://linux.oracle.com/cve/CVE-2014-0227.html
https://linux.oracle.com/errata/ELSA-2015-0991.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0227
https://source.jboss.org/changelog/JBossWeb?cs=2455
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.43
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-0227
|
| tomcat |
CVE-2014-7810 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2015-1621.html
http://rhn.redhat.com/errata/RHSA-2015-1622.html
http://rhn.redhat.com/errata/RHSA-2016-0492.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://svn.apache.org/viewvc?view=revision&revision=1644018
http://svn.apache.org/viewvc?view=revision&revision=1645642
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.44
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.59
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.17
http://www.debian.org/security/2015/dsa-3428
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/74665
http://www.securitytracker.com/id/1032330
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/security/cve/CVE-2014-7810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://linux.oracle.com/cve/CVE-2014-7810.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-7810
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-7810
|
| tomcat |
CVE-2015-5351 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://packetstormsecurity.com/files/135882/Apache-Tomcat-CSRF-Token-Leak.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/148
http://svn.apache.org/viewvc?view=revision&revision=1720652
http://svn.apache.org/viewvc?view=revision&revision=1720655
http://svn.apache.org/viewvc?view=revision&revision=1720658
http://svn.apache.org/viewvc?view=revision&revision=1720660
http://svn.apache.org/viewvc?view=revision&revision=1720661
http://svn.apache.org/viewvc?view=revision&revision=1720663
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/83330
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5351
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351
https://github.com/apache/tomcat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5351.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5351
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://softwaresupport.hpe.com/document/-/facetsearch/document/KM02978021
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20161020161943/http://www.securityfocus.com/bid/83330
https://www.cve.org/CVERecord?id=CVE-2015-5351
|
| tomcat |
CVE-2016-0714 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/145
http://svn.apache.org/viewvc?view=revision&revision=1725263
http://svn.apache.org/viewvc?view=revision&revision=1725914
http://svn.apache.org/viewvc?view=revision&revision=1726196
http://svn.apache.org/viewvc?view=revision&revision=1726203
http://svn.apache.org/viewvc?view=revision&revision=1726923
http://svn.apache.org/viewvc?view=revision&revision=1727034
http://svn.apache.org/viewvc?view=revision&revision=1727166
http://svn.apache.org/viewvc?view=revision&revision=1727182
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83327
http://www.securitytracker.com/id/1035069
http://www.securitytracker.com/id/1037640
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0714
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/50f1b1da794cd93b70ab5456d3c2c984408e1506
https://github.com/apache/tomcat/commit/79e8ad03404c131009811855f9a30d8d01c0c736
https://github.com/apache/tomcat/commit/824eb1d1ad922e7652ecf51adb2b9eebb5bb88b5
https://github.com/apache/tomcat/commit/e1b1002129fea4033329f6f619ba219527bbbd40
https://github.com/apache/tomcat/commit/f626da75fd59da82b14dee7b8cc46ad51eefdbe5
https://github.com/apache/tomcat/commit/ff1b659dc366a2ad47cd8f7e3544c796a1b15e46
https://github.com/apache/tomcat80/commit/2e5cc28052e84ba45196949ba602484221bbf33c
https://github.com/apache/tomcat80/commit/5430f30c79383e4d2d87785468905fcb00bace58
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2016-0714.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0714
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20170204045529/http://www.securityfocus.com/bid/83327
https://web.archive.org/web/20170601064840/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20170927131230/http://www.securitytracker.com/id/1037640
https://www.cve.org/CVERecord?id=CVE-2016-0714
|
| tomcat |
CVE-2016-0763 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179356.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/147
http://svn.apache.org/viewvc?view=revision&revision=1725926
http://svn.apache.org/viewvc?view=revision&revision=1725929
http://svn.apache.org/viewvc?view=revision&revision=1725931
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/83326
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0763
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/76ebc9007567c8326217dd94844540e1e27d8468
https://github.com/apache/tomcat/commit/c08641da04d31f730b56b8675301e55db97dfe88
https://github.com/apache/tomcat80/commit/0531f7aeff1999d362e0a68512a3517f2cf1a6ae
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
https://linux.oracle.com/cve/CVE-2016-0763.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0763
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160314101138/http://www.securityfocus.com/bid/83326
https://web.archive.org/web/20160404202803/http://www.securitytracker.com/id/1035069
https://www.cve.org/CVERecord?id=CVE-2016-0763
|
| tomcat |
CVE-2016-3092 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://jvn.jp/en/jp/JVN89379547/index.html
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E
http://markmail.org/message/oyxfv73jb2g7rjg3
http://rhn.redhat.com/errata/RHSA-2016-2068.html
http://rhn.redhat.com/errata/RHSA-2016-2069.html
http://rhn.redhat.com/errata/RHSA-2016-2070.html
http://rhn.redhat.com/errata/RHSA-2016-2071.html
http://rhn.redhat.com/errata/RHSA-2016-2072.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://svn.apache.org/viewvc?view=revision&revision=1743480
http://svn.apache.org/viewvc?view=revision&revision=1743722
http://svn.apache.org/viewvc?view=revision&revision=1743738
http://svn.apache.org/viewvc?view=revision&revision=1743742
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3609
http://www.debian.org/security/2016/dsa-3611
http://www.debian.org/security/2016/dsa-3614
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91453
http://www.securitytracker.com/id/1036427
http://www.securitytracker.com/id/1036900
http://www.securitytracker.com/id/1037029
http://www.securitytracker.com/id/1039606
http://www.ubuntu.com/usn/USN-3024-1
http://www.ubuntu.com/usn/USN-3027-1
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/security/cve/CVE-2016-3092
https://bugzilla.redhat.com/show_bug.cgi?id=1349468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092
https://github.com/advisories/GHSA-fvm3-cfvj-gxqq
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759
https://linux.oracle.com/cve/CVE-2016-3092.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-3092
https://security.gentoo.org/glsa/201705-09
https://security.gentoo.org/glsa/202107-39
https://security.netapp.com/advisory/ntap-20190212-0001
https://security.netapp.com/advisory/ntap-20190212-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://ubuntu.com/security/notices/USN-3027-1
https://web.archive.org/web/20160726114129/http://www.securitytracker.com/id/1036427
https://web.archive.org/web/20160924080828/http://www.securityfocus.com/bid/91453
https://web.archive.org/web/20170317103106/http://www.securitytracker.com/id/1037029
https://web.archive.org/web/20171103224941/http://www.securitytracker.com/id/1036900
https://web.archive.org/web/20171111060434/http://www.securitytracker.com/id/1039606
https://www.cve.org/CVERecord?id=CVE-2016-3092
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| tomcat |
CVE-2016-5388 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
http://rhn.redhat.com/errata/RHSA-2016-1624.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/91818
http://www.securitytracker.com/id/1036331
https://access.redhat.com/errata/RHSA-2016:1624
https://access.redhat.com/errata/RHSA-2016:1635
https://access.redhat.com/errata/RHSA-2016:1636
https://access.redhat.com/errata/RHSA-2016:2045
https://access.redhat.com/errata/RHSA-2016:2046
https://access.redhat.com/security/cve/CVE-2016-5388
https://bugzilla.redhat.com/show_bug.cgi?id=1353809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/1b91e91194a095ea922f96d1dccddf6fbc446e54
https://github.com/apache/tomcat/commit/880250877b0643956435282afb9c111450cfff4c
https://github.com/apache/tomcat/commit/fb3569fbb9a2f55459aa8e1e22bc35a737e66329
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5388.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5388
https://rhn.redhat.com/errata/RHSA-2016-1624.html
https://rhn.redhat.com/errata/RHSA-2016-2045.html
https://rhn.redhat.com/errata/RHSA-2016-2046.html
https://tomcat.apache.org/tomcat-7.0-doc/changelog.html
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4791-1
https://www.apache.org/security/asf-httpoxy-response.txt
https://www.cve.org/CVERecord?id=CVE-2016-5388
https://www.kb.cert.org/vuls/id/797896
|
| tomcat |
CVE-2016-6816 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-11.el7_3 |
http://rhn.redhat.com/errata/RHSA-2017-0244.html
http://rhn.redhat.com/errata/RHSA-2017-0245.html
http://rhn.redhat.com/errata/RHSA-2017-0246.html
http://rhn.redhat.com/errata/RHSA-2017-0247.html
http://rhn.redhat.com/errata/RHSA-2017-0250.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-0527.html
http://www.debian.org/security/2016/dsa-3738
http://www.openwall.com/lists/oss-security/2016/11/22/17
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/94461
http://www.securitytracker.com/id/1037332
https://access.redhat.com/articles/2991951
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:0935
https://access.redhat.com/security/cve/CVE-2016-6816
https://access.redhat.com/solutions/2891171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816
https://github.com/apache/tomcat/commit/516bda676ac8d0284da3e0295a7df70391315360
https://github.com/apache/tomcat/commit/cdc0a935c2173aff60039a0b85e57a461381107c
https://github.com/apache/tomcat/commit/f96f5751d418ae5a2f550be040daf9c5f7d99256
https://github.com/apache/tomcat80/commit/779d5d34e68e50d2f721897050b147106992f566
https://linux.oracle.com/cve/CVE-2016-6816.html
https://linux.oracle.com/errata/ELSA-2017-0935.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6816
https://security.netapp.com/advisory/ntap-20180607-0001
https://security.netapp.com/advisory/ntap-20180607-0001/
https://svn.apache.org/viewvc?view=revision&revision=1767641
https://svn.apache.org/viewvc?view=revision&revision=1767645
https://svn.apache.org/viewvc?view=revision&revision=1767653
https://svn.apache.org/viewvc?view=revision&revision=1767675
https://svn.apache.org/viewvc?view=revision&revision=1767683
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161204121236/http://www.securityfocus.com/bid/94461
https://web.archive.org/web/20170929085438/http://www.securitytracker.com/id/1037332
https://www.cve.org/CVERecord?id=CVE-2016-6816
https://www.exploit-db.com/exploits/41783
https://www.exploit-db.com/exploits/41783/
|
| tomcat |
CVE-2017-12616 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.securityfocus.com/bid/100897
http://www.securitytracker.com/id/1039393
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/security/cve/CVE-2017-12616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12616
https://github.com/apache/tomcat
https://lists.apache.org/thread.html/1df9b4552464caa42047062fe7175da0da06c18ecc8daf99258bbda6%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1df9b4552464caa42047062fe7175da0da06c18ecc8daf99258bbda6@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2017-12616
https://security.netapp.com/advisory/ntap-20171018-0001
https://security.netapp.com/advisory/ntap-20171018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://www.cve.org/CVERecord?id=CVE-2017-12616
https://www.synology.com/support/security/Synology_SA_17_54_Tomcat
|
| tomcat |
CVE-2017-5648 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-12.el7_3 |
http://www.debian.org/security/2017/dsa-3842
http://www.debian.org/security/2017/dsa-3843
http://www.openwall.com/lists/oss-security/2017/04/10/23
http://www.openwall.com/lists/oss-security/2020/07/20/8
http://www.securityfocus.com/bid/97530
http://www.securitytracker.com/id/1038220
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:1809
https://access.redhat.com/security/cve/CVE-2017-5648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5648
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0f7b9465d594b9814e1853d1e3a6e3aa51a21610
https://github.com/apache/tomcat/commit/6bb36dfdf6444efda074893dff493b9eb3648808
https://github.com/apache/tomcat/commit/dfa40863421d7681fed893b4256666491887e38c
https://github.com/apache/tomcat80/commit/6d73b079c55ee25dea1bbd0556bb568a4247dacd
https://linux.oracle.com/cve/CVE-2017-5648.html
https://linux.oracle.com/errata/ELSA-2017-1809.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5648
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180614-0001
https://security.netapp.com/advisory/ntap-20180614-0001/
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170417124117/http://www.securityfocus.com/bid/97530
https://web.archive.org/web/20170420115120/http://www.securitytracker.com/id/1038220
https://www.cve.org/CVERecord?id=CVE-2017-5648
|
| tomcat |
CVE-2017-7674 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.debian.org/security/2017/dsa-3974
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/100280
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/security/cve/CVE-2017-7674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7674
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/52382ebfbce20a98b01cd9d37184a12703987a5a
https://github.com/apache/tomcat/commit/9044c1672bbe4b2cf4c55028cc8b977cc62650e7
https://github.com/apache/tomcat/commit/b94478d45b7e1fc06134a785571f78772fa30fed
https://github.com/apache/tomcat80/commit/f52c242d92d4563dd1226dcc993ec37370ba9ce3
https://linux.oracle.com/cve/CVE-2017-7674.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/22b4bb077502f847e2b9fcf00b96e81e734466ab459780ff73b60c0f%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/22b4bb077502f847e2b9fcf00b96e81e734466ab459780ff73b60c0f@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread/bol4f8wyjfsbo135tw9gy49o5nf8qpth
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7674
https://security.netapp.com/advisory/ntap-20180614-0003
https://security.netapp.com/advisory/ntap-20180614-0003/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://svn.apache.org/viewvc?view=revision&revision=1795816
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20171115015045/http://www.securityfocus.com/bid/100280
https://web.archive.org/web/20210116171055/http://www.securityfocus.com/bid/100280
https://www.cve.org/CVERecord?id=CVE-2017-7674
|
| tomcat |
CVE-2018-11784 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.91
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.34
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.12
http://www.securityfocus.com/bid/105524
https://access.redhat.com/errata/RHSA-2019:0130
https://access.redhat.com/errata/RHSA-2019:0131
https://access.redhat.com/errata/RHSA-2019:0485
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/security/cve/CVE-2018-11784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11784
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/advisories/GHSA-5q99-f34m-67gc
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/b76e1dfb3dec3789cc700f8d022c872eb947a221
https://github.com/apache/tomcat/commit/efb860b3ff8ebcf606199b8d0d432f76898040da
https://github.com/apache/tomcat/commit/f9f147359b7c95511b64cd99bbc47917c01b3879
https://kc.mcafee.com/corporate/index?page=content&id=SB10284
https://linux.oracle.com/cve/CVE-2018-11784.html
https://linux.oracle.com/errata/ELSA-2019-1529.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP
https://nvd.nist.gov/vuln/detail/CVE-2018-11784
https://seclists.org/bugtraq/2019/Dec/43
https://security.netapp.com/advisory/ntap-20181014-0002
https://security.netapp.com/advisory/ntap-20181014-0002/
https://ubuntu.com/security/notices/USN-3787-1
https://usn.ubuntu.com/3787-1
https://usn.ubuntu.com/3787-1/
https://web.archive.org/web/20200227030058/http://www.securityfocus.com/bid/105524
https://www.cve.org/CVERecord?id=CVE-2018-11784
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat |
CVE-2018-1304 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103170
http://www.securitytracker.com/id/1040427
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:1320
https://access.redhat.com/errata/RHSA-2018:1447
https://access.redhat.com/errata/RHSA-2018:1448
https://access.redhat.com/errata/RHSA-2018:1449
https://access.redhat.com/errata/RHSA-2018:1450
https://access.redhat.com/errata/RHSA-2018:1451
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-1304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1304
https://github.com/advisories/GHSA-6rxj-58jh-436r
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2d69fde135302e8cff984bb2131ec69f2e396964
https://github.com/apache/tomcat/commit/5af7c13cff7cc8366c5997418e820989fabb8f48
https://github.com/apache/tomcat/commit/723ea6a5bc5e7bc49e5ef84273c3b3c164a6a4fd
https://github.com/apache/tomcat80/commit/9e700b93e3bf5c605267d20568a964169f9e0b79
https://linux.oracle.com/cve/CVE-2018-1304.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1304
https://security.netapp.com/advisory/ntap-20180706-0001
https://security.netapp.com/advisory/ntap-20180706-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20200227102806/http://www.securityfocus.com/bid/103170
https://web.archive.org/web/20200516074457/http://www.securitytracker.com/id/1040427
https://www.cve.org/CVERecord?id=CVE-2018-1304
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat |
CVE-2018-1305 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103144
http://www.securitytracker.com/id/1040428
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:1320
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-1305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1305
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2349801827f09fb6582a8afdeca704294106ad9a
https://github.com/apache/tomcat/commit/2aac69f694d42d9219eb27018b3da0ae1bdd73ab
https://github.com/apache/tomcat/commit/3e54b2a6314eda11617ff7a7b899c251e222b1a1
https://github.com/apache/tomcat/commit/4d637bc3986e5d09b9363e2144b8ba74fa6eac3a
https://github.com/apache/tomcat/commit/c63b96d72cd39287e17b2ba698f4eee0ba508073
https://github.com/apache/tomcat/commit/de6b4fd58b64828f374503b9ec76a12017b92895
https://linux.oracle.com/cve/CVE-2018-1305.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1305
https://security.netapp.com/advisory/ntap-20180706-0001
https://security.netapp.com/advisory/ntap-20180706-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20200227030042/http://www.securityfocus.com/bid/103144
https://web.archive.org/web/20200516094320/http://www.securitytracker.com/id/1040428
https://www.cve.org/CVERecord?id=CVE-2018-1305
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat |
CVE-2018-8014 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.89
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.53
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.32
http://tomcat.apache.org/security-9.html
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.9
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104203
http://www.securitytracker.com/id/1040998
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:2469
https://access.redhat.com/errata/RHSA-2018:2470
https://access.redhat.com/errata/RHSA-2018:3768
https://access.redhat.com/errata/RHSA-2019:0450
https://access.redhat.com/errata/RHSA-2019:0451
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-8014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8014
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/advisories/GHSA-r4x2-3cq5-hqvp
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/5877390a9605f56d9bd6859a54ccbfb16374a78b
https://github.com/apache/tomcat/commit/60f596a21fd6041335a3a1a4015d4512439cecb5
https://github.com/apache/tomcat/commit/d83a76732e6804739b81d8b2056365307637b42d
https://github.com/apache/tomcat80/commit/2c9d8433bd3247a2856d4b2555447108758e813e
https://linux.oracle.com/cve/CVE-2018-8014.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://nvd.nist.gov/vuln/detail/CVE-2018-8014
https://seclists.org/bugtraq/2019/Dec/43
https://security.netapp.com/advisory/ntap-20181018-0002
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20181017143233/http://www.securityfocus.com/bid/104203
https://web.archive.org/web/20201207080723/http://www.securitytracker.com/id/1041888
https://web.archive.org/web/20201207101131/http://www.securitytracker.com/id/1040998
https://www.cve.org/CVERecord?id=CVE-2018-8014
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| tomcat |
CVE-2022-23181 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-23181
https://github.com/apache/tomcat
https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9
https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23181
https://security.netapp.com/advisory/ntap-20220217-0010
https://security.netapp.com/advisory/ntap-20220217-0010/
https://www.cve.org/CVERecord?id=CVE-2022-23181
https://www.debian.org/security/2022/dsa-5265
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
|
| tomcat |
CVE-2023-24998 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/05/22/1
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-24998
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://commons.apache.org/proper/commons-fileupload/security-reports.html
https://commons.apache.org/proper/commons-fileupload/security-reports.html#Fixed_in_Apache_Commons_FileUpload_1.5
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/commons-fileupload
https://github.com/apache/commons-fileupload/commit/e20c04990f7420ca917e96a84cec58b13a1b3d17
https://github.com/apache/tomcat/commit/8a2285f13affa961cc65595aad999db5efae45ce
https://github.com/apache/tomcat/commit/9ca96c8c1eba86c0aaa2e6be581ba2a7d4d4ae6e
https://github.com/apache/tomcat/commit/cf77cc545de0488fb89e24294151504a7432df74
https://github.com/apache/tomcat/commit/d53d8e7f77042cc32a3b98f589496a1ef5088e38
https://linux.oracle.com/cve/CVE-2023-24998.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-24998
https://security.gentoo.org/glsa/202305-37
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-24998
https://www.debian.org/security/2023/dsa-5522
|
| tomcat |
CVE-2023-28708 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-28708
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://bz.apache.org/bugzilla/show_bug.cgi?id=66471
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3b51230764da595bb19e8d0962dd8c69ab40dfab
https://github.com/apache/tomcat/commit/5b72c94e8b2c4ada63a1d91dc527bf4d8fd1f510
https://github.com/apache/tomcat/commit/c64d496dda1560b5df113be55fbfaefec349b50f
https://github.com/apache/tomcat/commit/f509bbf31fc00abe3d9f25ebfabca5e05173da5b
https://linux.oracle.com/cve/CVE-2023-28708.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/hdksc59z3s7tm39x0pp33mtwdrt8qr67
https://nvd.nist.gov/vuln/detail/CVE-2023-28708
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-28708
|
| tomcat |
CVE-2023-28709 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/05/22/1
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-28709
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-28709.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j
https://nvd.nist.gov/vuln/detail/CVE-2023-28709
https://security.gentoo.org/glsa/202305-37
https://security.netapp.com/advisory/ntap-20230616-0004
https://security.netapp.com/advisory/ntap-20230616-0004/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-28709
https://www.debian.org/security/2023/dsa-5521
|
| tomcat |
CVE-2023-41080 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-41080
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/4998ad745b67edeadefe541c94ed029b53933d3b
https://github.com/apache/tomcat/commit/77c0ce2d169efa248b64b992e547aad549ec906b
https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27
https://github.com/apache/tomcat/commit/e3703c9abb8fe0d5602f6ba8a8f11d4b6940815a
https://linux.oracle.com/cve/CVE-2023-41080.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-41080
https://security.netapp.com/advisory/ntap-20230921-0006
https://security.netapp.com/advisory/ntap-20230921-0006/
https://www.cve.org/CVERecord?id=CVE-2023-41080
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat |
CVE-2023-42794 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/8
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-42794
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-42794.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/vvbr2ms7lockj1hlhz5q3wmxb2mwcw82
https://nvd.nist.gov/vuln/detail/CVE-2023-42794
https://www.cve.org/CVERecord?id=CVE-2023-42794
|
| tomcat |
CVE-2023-42795 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/9
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-42795
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-42795.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/065jfyo583490r9j2v73nhpyxdob56lw
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-42795
https://security.netapp.com/advisory/ntap-20231103-0007
https://security.netapp.com/advisory/ntap-20231103-0007/
https://www.cve.org/CVERecord?id=CVE-2023-42795
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat |
CVE-2023-45648 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/10
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-45648
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/59583245639d8c42ae0009f4a4a70464d3ea70a0
https://github.com/apache/tomcat/commit/8ecff306507be8e4fd3adee1ae5de1ea6661a8f4
https://github.com/apache/tomcat/commit/eb5c094e5560764cda436362254997511a3ca1f6
https://linux.oracle.com/cve/CVE-2023-45648.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdp
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-45648
https://security.netapp.com/advisory/ntap-20231103-0007
https://security.netapp.com/advisory/ntap-20231103-0007/
https://www.cve.org/CVERecord?id=CVE-2023-45648
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat |
CVE-2014-0096 |
LOW |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/135
http://secunia.com/advisories/59121
http://secunia.com/advisories/59616
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://svn.apache.org/viewvc?view=revision&revision=1578610
http://svn.apache.org/viewvc?view=revision&revision=1578611
http://svn.apache.org/viewvc?view=revision&revision=1578637
http://svn.apache.org/viewvc?view=revision&revision=1578655
http://svn.apache.org/viewvc?view=revision&revision=1585853
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.novell.com/support/kb/doc.php?id=7010166
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67667
http://www.securitytracker.com/id/1030301
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3c53c4da7bcf300f519eaed5ad1751d24dd59f6b
https://github.com/apache/tomcat/commit/5c545da226b3c71ed9603c38ad2de88057778c1b
https://github.com/apache/tomcat/commit/913d94b289e056107e521dbab8e79cc72a62a331
https://github.com/apache/tomcat/commit/970c23bfd24dfa1dcb86ed917e6c8b47dcfb4433
https://github.com/apache/tomcat80/commit/65ed69d96a101dfa99eea2cfe17e9e87b310084c
https://github.com/apache/tomcat80/commit/f3f2979df693a9c84c6742fcb162f3671b0a50d3
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0096.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0096
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0096
|
| tomcat |
CVE-2014-0119 |
LOW |
7.0.42-4.el7 |
7.0.42-8.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/141
http://secunia.com/advisories/59732
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://svn.apache.org/viewvc?view=revision&revision=1588193
http://svn.apache.org/viewvc?view=revision&revision=1588199
http://svn.apache.org/viewvc?view=revision&revision=1589640
http://svn.apache.org/viewvc?view=revision&revision=1589837
http://svn.apache.org/viewvc?view=revision&revision=1589980
http://svn.apache.org/viewvc?view=revision&revision=1589983
http://svn.apache.org/viewvc?view=revision&revision=1589985
http://svn.apache.org/viewvc?view=revision&revision=1589990
http://svn.apache.org/viewvc?view=revision&revision=1589992
http://svn.apache.org/viewvc?view=revision&revision=1589997
http://svn.apache.org/viewvc?view=revision&revision=1590028
http://svn.apache.org/viewvc?view=revision&revision=1590036
http://svn.apache.org/viewvc?view=revision&revision=1593815
http://svn.apache.org/viewvc?view=revision&revision=1593821
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67669
http://www.securitytracker.com/id/1030298
http://www.ubuntu.com/usn/USN-2654-1
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/080878ea519d8c74c53721a9ebf7be6fcf6f1f2f
https://github.com/apache/tomcat/commit/50311bed8d87e452ff0e69838ba312c4fe899b2d
https://github.com/apache/tomcat/commit/5517c5517e8a7ddb994504f0c5c05001a376b10c
https://github.com/apache/tomcat/commit/5aae1323c31d643afa9f2db80713b8e97b5123af
https://github.com/apache/tomcat/commit/6246d8307fb5f2b4ff0b0f4d6d1b0250dff01a81
https://github.com/apache/tomcat/commit/769477b9bc8442db3f571385fa0c3e206242cbf1
https://github.com/apache/tomcat/commit/934f884f330dad192d2c5dc950e28f4cd281461b
https://github.com/apache/tomcat/commit/ad3b34a290a0255d2a4c356a3611ab41ed9d04f5
https://github.com/apache/tomcat/commit/ce70ee6b8fe437a498a375215011056702b0c481
https://github.com/apache/tomcat/commit/ebe5c16f18ce1559e8462a94b3876a98525980d2
https://github.com/apache/tomcat/commit/f8b316acbbf9fabf87cc137e9777e912eda0d834
https://github.com/apache/tomcat80/commit/25251de791a6a7be13f2f3d3a66119a77025272d
https://github.com/apache/tomcat80/commit/4d90e355dc5ced4c53585c2b4700f71a52d8f447
https://github.com/apache/tomcat80/commit/51e59532ad4c604f55575963dc7a7f0250cb420f
https://github.com/apache/tomcat80/commit/69a8a72283c3395ece8b899cf8562e126de97a27
https://github.com/apache/tomcat80/commit/77e014cef5d5af619bcf77eaebf22c284d420802
https://github.com/apache/tomcat80/commit/7d33457de5fc5a652a88fb9bbc9ba4cbbda58f04
https://github.com/apache/tomcat80/commit/d59fd4398c8ae6361e0b13c491f66b51e49a7441
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0119.html
https://linux.oracle.com/errata/ELSA-2014-1038.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0119
https://ubuntu.com/security/notices/USN-2654-1
https://www.cve.org/CVERecord?id=CVE-2014-0119
|
| tomcat |
CVE-2014-0230 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://mail-archives.apache.org/mod_mbox/tomcat-announce/201505.mbox/%3C554949D1.8030904%40apache.org%3E
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://openwall.com/lists/oss-security/2015/04/10/1
http://rhn.redhat.com/errata/RHSA-2015-1621.html
http://rhn.redhat.com/errata/RHSA-2015-1622.html
http://rhn.redhat.com/errata/RHSA-2015-2661.html
http://rhn.redhat.com/errata/RHSA-2016-0595.html
http://rhn.redhat.com/errata/RHSA-2016-0596.html
http://rhn.redhat.com/errata/RHSA-2016-0597.html
http://rhn.redhat.com/errata/RHSA-2016-0598.html
http://rhn.redhat.com/errata/RHSA-2016-0599.html
http://svn.apache.org/viewvc?view=revision&revision=1603770
http://svn.apache.org/viewvc?view=revision&revision=1603775
http://svn.apache.org/viewvc?view=revision&revision=1603779
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.44
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.9
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/74475
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/errata/RHSA-2015:2659
https://access.redhat.com/errata/RHSA-2015:2660
https://access.redhat.com/security/cve/CVE-2014-0230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0230
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6b2cfacf749be186ea77249a979af1d4863e47ba
https://github.com/apache/tomcat/commit/812088583d0e60717a8fe9c6d14e12bcdc3e6c51
https://github.com/apache/tomcat/commit/b1c8477e3e3ee635d19cc4d5987c2b157431e0c1
https://github.com/apache/tomcat/commit/c1357e649641844109711d60cacb98e4b5fcd3cb
https://github.com/apache/tomcat/commit/e28dd578fad90a6d5726ec34f3245c9f99d909a5
https://github.com/apache/tomcat/commit/e3146f4b03a2386c3e57597e86134d4ed5c31303
https://github.com/apache/tomcat/commit/fc049912464f0dcf9dede3761f38049369057e16
https://github.com/apache/tomcat/commit/fdd9f11dc24b95e5425076abb58e968336f320a2
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://issues.jboss.org/browse/JWS-219
https://issues.jboss.org/browse/JWS-220
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0230
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-0230
|
| tomcat |
CVE-2015-5174 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://packetstormsecurity.com/files/135883/Apache-Tomcat-Limited-Directory-Traversal.html
http://rhn.redhat.com/errata/RHSA-2016-1435.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://seclists.org/bugtraq/2016/Feb/149
http://svn.apache.org/viewvc?view=revision&revision=1696281
http://svn.apache.org/viewvc?view=revision&revision=1696284
http://svn.apache.org/viewvc?view=revision&revision=1700897
http://svn.apache.org/viewvc?view=revision&revision=1700898
http://svn.apache.org/viewvc?view=revision&revision=1700900
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83329
http://www.securitytracker.com/id/1035070
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1432
https://access.redhat.com/errata/RHSA-2016:1433
https://access.redhat.com/errata/RHSA-2016:1434
https://access.redhat.com/security/cve/CVE-2015-5174
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5174.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r0b24f2c7507f702348e2c2d64e8a5de72bad6173658e8d8e45322ac2%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r0b24f2c7507f702348e2c2d64e8a5de72bad6173658e8d8e45322ac2@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd4863c79bf729aabb95571fd845a9ea4ee3ae3fcee48f35aba007350%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd4863c79bf729aabb95571fd845a9ea4ee3ae3fcee48f35aba007350@%3Cusers.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5174
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://www.cve.org/CVERecord?id=CVE-2015-5174
|
| tomcat |
CVE-2015-5345 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://packetstormsecurity.com/files/135892/Apache-Tomcat-Directory-Disclosure.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://seclists.org/bugtraq/2016/Feb/146
http://seclists.org/fulldisclosure/2016/Feb/122
http://svn.apache.org/viewvc?view=revision&revision=1715206
http://svn.apache.org/viewvc?view=revision&revision=1715207
http://svn.apache.org/viewvc?view=revision&revision=1715213
http://svn.apache.org/viewvc?view=revision&revision=1715216
http://svn.apache.org/viewvc?view=revision&revision=1716882
http://svn.apache.org/viewvc?view=revision&revision=1716894
http://svn.apache.org/viewvc?view=revision&revision=1717209
http://svn.apache.org/viewvc?view=revision&revision=1717212
http://svn.apache.org/viewvc?view=revision&revision=1717216
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.qcsec.com/blog/CVE-2015-5345-apache-tomcat-vulnerability.html
http://www.securityfocus.com/bid/83328
http://www.securitytracker.com/id/1035071
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5345
https://bto.bluecoat.com/security-advisory/sa118
https://bz.apache.org/bugzilla/show_bug.cgi?id=58765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/127d8ea86d245846f0472865f0eb1eb111955e71
https://github.com/apache/tomcat/commit/58c09b6217c546e1a251a82da227018f05277228
https://github.com/apache/tomcat/commit/66daa4adc14b3e939659879153c0a579fdfcb099
https://github.com/apache/tomcat/commit/7288bc70a14edcfeff0a96e333a858be374cfc64
https://github.com/apache/tomcat/commit/816552abf6735fa37dfd37c8a7bfbdbd045477e0
https://github.com/apache/tomcat/commit/8437193708e4bf6b2861a7953dc472f9dad49111
https://github.com/apache/tomcat/commit/89cd0cf33a99dbbcf5c69050a83b6876e39269d7
https://github.com/apache/tomcat/commit/a273b5f45cb46a273d06510a689fc314155a952d
https://github.com/apache/tomcat/commit/c584c7c4ab0686e4125eefcd0afb32fb8269da3d
https://github.com/apache/tomcat80/commit/2b643a4e36d318d55ec57fee57610671656d23c0
https://github.com/apache/tomcat80/commit/c15c2aba8eb42425f9ebcfcaef579dada38ad3a2
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://kc.mcafee.com/corporate/index?page=content&id=SB10156
https://linux.oracle.com/cve/CVE-2015-5345.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5345
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321235514/http://www.securitytracker.com/id/1035071
https://web.archive.org/web/20160804024910/http://www.securityfocus.com/bid/83328
https://www.cve.org/CVERecord?id=CVE-2015-5345
|
| tomcat |
CVE-2015-5346 |
LOW |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://packetstormsecurity.com/files/135890/Apache-Tomcat-Session-Fixation.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/143
http://svn.apache.org/viewvc?view=revision&revision=1713184
http://svn.apache.org/viewvc?view=revision&revision=1713185
http://svn.apache.org/viewvc?view=revision&revision=1713187
http://svn.apache.org/viewvc?view=revision&revision=1723414
http://svn.apache.org/viewvc?view=revision&revision=1723506
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83323
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5346
https://bto.bluecoat.com/security-advisory/sa118
https://bz.apache.org/bugzilla/show_bug.cgi?id=58809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/04164c1f01b973e548d95511d417f414ca723cb8
https://github.com/apache/tomcat/commit/6287be37d8d06c320215c45f7e2b8380411692e0
https://github.com/apache/tomcat/commit/83679b99cd40caa401d173c8f8e72fc98eb5d5be
https://github.com/apache/tomcat80/commit/41fbee7ba15435a831f765597ff907c56ebf2169
https://github.com/apache/tomcat80/commit/c39b7ffc2145644f7f3cf9e3cd4aada5048e56a0
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5346.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5346
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20160912063818/http://www.securityfocus.com/bid/83323
https://www.cve.org/CVERecord?id=CVE-2015-5346
|
| tomcat |
CVE-2016-0706 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/144
http://svn.apache.org/viewvc?view=revision&revision=1722799
http://svn.apache.org/viewvc?view=revision&revision=1722800
http://svn.apache.org/viewvc?view=revision&revision=1722801
http://svn.apache.org/viewvc?view=revision&revision=1722802
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83324
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0706
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706
https://github.com/apache/tomcat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2016-0706.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0706
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160226210040/http://www.securityfocus.com/bid/83324
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://www.cve.org/CVERecord?id=CVE-2016-0706
|
| tomcat |
CVE-2016-0762 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/pzuk6hauzljnm4r7?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93939
http://www.securitytracker.com/id/1037144
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-0762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0762
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/86b2e436099cb48f30dad950175c5beeeb763756
https://github.com/apache/tomcat/commit/970e615c7ade6ec6c341470bbc76aa1256353737
https://github.com/apache/tomcat/commit/d79c63d424fe6b225678416343b9ce106dec947c
https://github.com/apache/tomcat80/commit/dc4c3317452f0bc2c5e1f6a08d3bd9f22488b450
https://linux.oracle.com/cve/CVE-2016-0762.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/1872f96bad43647832bdd84a408794cd06d9cbb557af63085ca10009%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1872f96bad43647832bdd84a408794cd06d9cbb557af63085ca10009@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0762
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://www.cve.org/CVERecord?id=CVE-2016-0762
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat |
CVE-2016-5018 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/lixw6iyojoxwfizv?q=list:org.apache.tomcat.announce/
http://packetstormsecurity.com/files/155873/Tomcat-9.0.0.M1-Sandbox-Escape.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-1551.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93942
http://www.securitytracker.com/id/1037142
http://www.securitytracker.com/id/1038757
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:1548
https://access.redhat.com/errata/RHSA-2017:1549
https://access.redhat.com/errata/RHSA-2017:1550
https://access.redhat.com/errata/RHSA-2017:1552
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-5018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5018
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/648122fef84d3b43223e0b5ae668f84719dada0a
https://github.com/apache/tomcat/commit/890a2f681ed2f3461b27983d7da9737375ff2ae4
https://github.com/apache/tomcat/commit/a6b1ebc246b91b854237e5aad3dfd2b5460ea282
https://linux.oracle.com/cve/CVE-2016-5018.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9b3a63a20c87179815fdea14f6766853bafe79a0042dc0b4aa878a9e%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9b3a63a20c87179815fdea14f6766853bafe79a0042dc0b4aa878a9e@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-5018
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161125134649/http://www.securityfocus.com/bid/93942
https://web.archive.org/web/20170908024318/http://www.securitytracker.com/id/1037142
https://web.archive.org/web/20171012232225/http://www.securitytracker.com/id/1038757
https://www.cve.org/CVERecord?id=CVE-2016-5018
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat |
CVE-2016-6325 |
LOW |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93478
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/security/cve/CVE-2016-6325
https://bugzilla.redhat.com/show_bug.cgi?id=1367447
https://linux.oracle.com/cve/CVE-2016-6325.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6325
https://www.cve.org/CVERecord?id=CVE-2016-6325
|
| tomcat |
CVE-2016-6794 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/zk7w6yly5mviocci?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93943
http://www.securitytracker.com/id/1037143
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6794
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0b41766456b1980e4f809e13ad6dc9fa912bae7e
https://github.com/apache/tomcat/commit/c1660182010b4255c21c874d69c124370a67784a
https://github.com/apache/tomcat/commit/f8db078f1e6e8b225f8344e63595113ca34cd408
https://github.com/apache/tomcat80/commit/ae6163a4f230bc679abfc93e048ff92996badad6
https://linux.oracle.com/cve/CVE-2016-6794.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/09d2f2c65ac4ff5da42f15dc2b0f78b655e50f1a42e8a9784134a9eb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/09d2f2c65ac4ff5da42f15dc2b0f78b655e50f1a42e8a9784134a9eb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6794
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20170317100547/http://www.securitytracker.com/id/1037143
https://web.archive.org/web/20170626130744/http://www.securityfocus.com/bid/93943
https://www.cve.org/CVERecord?id=CVE-2016-6794
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat |
CVE-2016-6796 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/hynaeawxxhpvvctu?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-1551.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93944
http://www.securitytracker.com/id/1037141
http://www.securitytracker.com/id/1038757
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:1548
https://access.redhat.com/errata/RHSA-2017:1549
https://access.redhat.com/errata/RHSA-2017:1550
https://access.redhat.com/errata/RHSA-2017:1552
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/f603f2f4595073f9490e01699d2083112a7c09a7
https://github.com/apache/tomcat/commit/f97769f50ee2613e1bf27107a01d48907fd993ac
https://github.com/apache/tomcat/commit/ffa0346fba2946401630291b642f1cff66d6a2be
https://github.com/apache/tomcat80/commit/d98fa92b9dfc90fe1ffdaa3cce1be3be84532260
https://linux.oracle.com/cve/CVE-2016-6796.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5a2105a56b2495ab70fa568f06925bd861f0d71ffab4fb38bb4fdc45%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5a2105a56b2495ab70fa568f06925bd861f0d71ffab4fb38bb4fdc45@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6796
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161029105733/http://www.securityfocus.com/bid/93944
https://web.archive.org/web/20161103080055/http://www.securitytracker.com/id/1037141
https://web.archive.org/web/20171012232225/http://www.securitytracker.com/id/1038757
https://www.cve.org/CVERecord?id=CVE-2016-6796
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat |
CVE-2016-6797 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/wrku5orwxfpt5mzl?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93940
http://www.securitytracker.com/id/1037145
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2859ac3eae132383cb6f3f2042e25d7a4a281b0d
https://github.com/apache/tomcat/commit/b3406e6c318378cbf440f902f9fdbb8b440aef4e
https://github.com/apache/tomcat/commit/d6b5600afe75e1086dd564344e1d085966e4237d
https://github.com/apache/tomcat80/commit/824c7dc781056442046db0ae34bcf1497f23f44c
https://linux.oracle.com/cve/CVE-2016-6797.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9325837eb00cba5752c092047433c7f0415134d16e7f391447ff4352%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9325837eb00cba5752c092047433c7f0415134d16e7f391447ff4352@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6797
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20170320064509/http://www.securitytracker.com/id/1037145
https://web.archive.org/web/20170423095945/http://www.securityfocus.com/bid/93940
https://www.cve.org/CVERecord?id=CVE-2016-6797
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat |
CVE-2018-8034 |
LOW |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283%40minotaur.apache.org%3E
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3E
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104895
http://www.securitytracker.com/id/1041374
https://access.redhat.com/errata/RHSA-2019:0130
https://access.redhat.com/errata/RHSA-2019:0131
https://access.redhat.com/errata/RHSA-2019:0450
https://access.redhat.com/errata/RHSA-2019:0451
https://access.redhat.com/errata/RHSA-2019:1159
https://access.redhat.com/errata/RHSA-2019:1160
https://access.redhat.com/errata/RHSA-2019:1161
https://access.redhat.com/errata/RHSA-2019:1162
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/errata/RHSA-2019:3892
https://access.redhat.com/security/cve/CVE-2018-8034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8034
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2835bb4e030c1c741ed0847bb3b9c3822e4fbc8a
https://github.com/apache/tomcat/commit/2c522795166c930741a9cecca76797bf48cb1634
https://linux.oracle.com/cve/CVE-2018-8034.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2018-8034
https://security.netapp.com/advisory/ntap-20180817-0001
https://security.netapp.com/advisory/ntap-20180817-0001/
https://ubuntu.com/security/notices/USN-3723-1
https://usn.ubuntu.com/3723-1
https://usn.ubuntu.com/3723-1/
https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104895
https://web.archive.org/web/20200517032514/http://www.securitytracker.com/id/1041374
https://www.cve.org/CVERecord?id=CVE-2018-8034
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat |
CVE-2019-0221 |
LOW |
7.0.42-4.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html
http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2019/May/50
http://www.securityfocus.com/bid/108545
https://access.redhat.com/errata/RHSA-2019:3929
https://access.redhat.com/errata/RHSA-2019:3931
https://access.redhat.com/security/cve/CVE-2019-0221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0221
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/15fcd166ea2c1bb79e8541b8e1a43da9c452ceea
https://github.com/apache/tomcat/commit/44ec74c44dcd05cd7e90967c04d40b51440ecd7e
https://github.com/apache/tomcat/commit/4fcdf706f3ecf35912a600242f89637f5acb32da
https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46
https://mail-archives.apache.org/mod_mbox/www-announce/201905.mbox/%3Cb1905aa6-f340-8d0b-58c4-8ac3ebcbfa54@apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-0221
https://seclists.org/bugtraq/2019/Dec/43
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20190606-0001
https://security.netapp.com/advisory/ntap-20190606-0001/
https://support.f5.com/csp/article/K13184144?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K13184144?utm_source=f5support&utm_medium=RSS
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4128-1
https://ubuntu.com/security/notices/USN-4128-2
https://usn.ubuntu.com/4128-1
https://usn.ubuntu.com/4128-1/
https://usn.ubuntu.com/4128-2
https://usn.ubuntu.com/4128-2/
https://web.archive.org/web/20200227055048/http://www.securityfocus.com/bid/108545
https://www.cve.org/CVERecord?id=CVE-2019-0221
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221
https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/
|
| tomcat |
CVE-2019-17563 |
LOW |
7.0.42-4.el7 |
7.0.76-15.el7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html
http://mail-archives.apache.org/mod_mbox/www-announce/201912.mbox/%3C21b7a375-7297-581b-1f8e-06622d36775b@apache.org%3E
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.30
https://access.redhat.com/security/cve/CVE-2019-17563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17563
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2019-17563.html
https://linux.oracle.com/errata/ELSA-2020-4004.html
https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e%40%3Cissues.cxf.apache.org%3E
https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17563
https://seclists.org/bugtraq/2019/Dec/43
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20200107-0001
https://security.netapp.com/advisory/ntap-20200107-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.99
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.50
https://ubuntu.com/security/notices/USN-4251-1
https://usn.ubuntu.com/4251-1
https://usn.ubuntu.com/4251-1/
https://www.cve.org/CVERecord?id=CVE-2019-17563
https://www.debian.org/security/2019/dsa-4596
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
|
| tomcat |
CVE-2020-1935 |
LOW |
7.0.42-4.el7 |
7.0.76-16.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
https://access.redhat.com/security/cve/CVE-2020-1935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1935
https://linux.oracle.com/cve/CVE-2020-1935.html
https://linux.oracle.com/errata/ELSA-2020-5020.html
https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1935
https://security.netapp.com/advisory/ntap-20200327-0005
https://security.netapp.com/advisory/ntap-20200327-0005/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31
https://ubuntu.com/security/notices/USN-4448-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://www.cve.org/CVERecord?id=CVE-2020-1935
https://www.debian.org/security/2020/dsa-4673
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| tomcat |
CVE-2021-25329 |
LOW |
7.0.42-4.el7 |
|
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3C811bba77-e74e-9f9b-62ca-5253a09ba84f%40apache.org%3E
http://www.openwall.com/lists/oss-security/2021/03/01/2
https://access.redhat.com/security/cve/CVE-2021-25329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25329
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2021-25329
https://security.gentoo.org/glsa/202208-34
https://security.netapp.com/advisory/ntap-20210409-0002
https://security.netapp.com/advisory/ntap-20210409-0002/
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.108
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43
https://ubuntu.com/security/notices/USN-5360-1
https://www.cve.org/CVERecord?id=CVE-2021-25329
https://www.debian.org/security/2021/dsa-4891
https://www.openwall.com/lists/oss-security/2021/03/01/2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat |
CVE-2022-29885 |
LOW |
7.0.42-4.el7 |
|
http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2022-29885
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0fa7721f11d565a2cd2e44366c388ad6a3e6357d
https://github.com/apache/tomcat/commit/36826ea638457d7e17876a70f89cb435b6db0d91
https://github.com/apache/tomcat/commit/b679bc627f5a4ea6510af95adfb7476b07eba890
https://github.com/apache/tomcat/commit/eaafd28296c54d983e28a47953c1f5cb2c334f48
https://lists.apache.org/thread/2b4qmhbcyqvc7dyfpjyx54c03x65vhcv
https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29885
https://security.netapp.com/advisory/ntap-20220629-0002
https://security.netapp.com/advisory/ntap-20220629-0002/
https://www.cve.org/CVERecord?id=CVE-2022-29885
https://www.debian.org/security/2022/dsa-5265
https://www.oracle.com/security-alerts/cpujul2022.html
|
| tomcat |
CVE-2022-4132 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-4132
https://bugzilla.redhat.com/show_bug.cgi?id=2147372
https://nvd.nist.gov/vuln/detail/CVE-2022-4132
https://www.cve.org/CVERecord?id=CVE-2022-4132
|
| tomcat |
CVE-2022-42252 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-42252
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0d089a15047faf9cb3c82f80f4d28febd4798920
https://github.com/apache/tomcat/commit/4c7f4fd09d2cc1692112ef70b8ee23a7a037ae77
https://github.com/apache/tomcat/commit/a1c07906d8dcaf7957e5cc97f5cdbac7d18a205a
https://github.com/apache/tomcat/commit/c9fe754e5d17e262dfbd3eab2a03ca96ff372dc3
https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq
https://nvd.nist.gov/vuln/detail/CVE-2022-42252
https://security.gentoo.org/glsa/202305-37
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2022-42252
|
| tomcat |
CVE-2022-45143 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-45143
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0cab3a56bd89f70e7481bb0d68395dc7e130dbbf
https://github.com/apache/tomcat/commit/6a0ac6a438cbbb66b6e9c5223842f53bf0cb50aa
https://github.com/apache/tomcat/commit/b336f4e58893ea35114f1e4a415657f723b1298e
https://lists.apache.org/thread/yqkd183xrw3wqvnpcg3osbcryq85fkzj
https://nvd.nist.gov/vuln/detail/CVE-2022-45143
https://security.gentoo.org/glsa/202305-37
https://www.cve.org/CVERecord?id=CVE-2022-45143
|
| tomcat-el-2.2-api |
CVE-2014-0186 |
HIGH |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://www.osvdb.org/108060
https://access.redhat.com/security/cve/CVE-2014-0186
https://bugzilla.redhat.com/show_bug.cgi?id=1089884
https://linux.oracle.com/cve/CVE-2014-0186.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://nvd.nist.gov/vuln/detail/CVE-2014-0186
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://security-tracker.debian.org/tracker/CVE-2014-0186
https://www.cve.org/CVERecord?id=CVE-2014-0186
|
| tomcat-el-2.2-api |
CVE-2016-5425 |
HIGH |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
http://legalhackers.com/advisories/Tomcat-RedHat-based-Root-Privilege-Escalation-Exploit.txt
http://packetstormsecurity.com/files/139041/Apache-Tomcat-8-7-6-Privilege-Escalation.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://www.openwall.com/lists/oss-security/2016/10/10/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93472
http://www.securitytracker.com/id/1036979
https://access.redhat.com/security/cve/CVE-2016-5425
https://linux.oracle.com/cve/CVE-2016-5425.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d%40%3Cissues.activemq.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-5425
https://www.cve.org/CVERecord?id=CVE-2016-5425
https://www.exploit-db.com/exploits/40488/
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat-el-2.2-api |
CVE-2016-8745 |
HIGH |
7.0.42-4.el7 |
7.0.69-11.el7_3 |
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-0527.html
http://www.debian.org/security/2017/dsa-3754
http://www.debian.org/security/2017/dsa-3755
http://www.openwall.com/lists/oss-security/2016/12/12/1
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/94828
http://www.securitytracker.com/id/1037432
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:0935
https://access.redhat.com/security/cve/CVE-2016-8745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/143bb466cf96a89e791b7db5626055ea819dad89
https://github.com/apache/tomcat/commit/16a57bc885e212839f1d717b94b01d154a36943a
https://github.com/apache/tomcat/commit/cbc9b18a845d3c8c053ac293dffda6c6c19dd92b
https://github.com/apache/tomcat80/commit/3dd2fec73e0de1edc1d3eb1c52a01255fdfc84e7
https://linux.oracle.com/cve/CVE-2016-8745.html
https://linux.oracle.com/errata/ELSA-2017-0935.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/4113c05d37f37c12b8033205684f04033c5f7a9bae117d4af23b32b4%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/4113c05d37f37c12b8033205684f04033c5f7a9bae117d4af23b32b4@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8745
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180607-0002
https://security.netapp.com/advisory/ntap-20180607-0002/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9
https://ubuntu.com/security/notices/USN-3177-1
https://web.archive.org/web/20200227165932/http://www.securityfocus.com/bid/94828
https://web.archive.org/web/20200517114357/http://www.securitytracker.com/id/1037432
https://www.cve.org/CVERecord?id=CVE-2016-8745
|
| tomcat-el-2.2-api |
CVE-2017-12615 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html
http://www.securityfocus.com/bid/100901
http://www.securitytracker.com/id/1039392
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/security/cve/CVE-2017-12615
https://github.com/advisories/GHSA-pjfr-qf3p-3q25
https://github.com/breaktoprotect/CVE-2017-12615
https://linux.oracle.com/cve/CVE-2017-12615.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-12615
https://security.netapp.com/advisory/ntap-20171018-0001
https://security.netapp.com/advisory/ntap-20171018-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
https://www.cve.org/CVERecord?id=CVE-2017-12615
https://www.exploit-db.com/exploits/42953
https://www.exploit-db.com/exploits/42953/
https://www.synology.com/support/security/Synology_SA_17_54_Tomcat
|
| tomcat-el-2.2-api |
CVE-2017-12617 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/100954
http://www.securitytracker.com/id/1039552
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2018:0268
https://access.redhat.com/errata/RHSA-2018:0269
https://access.redhat.com/errata/RHSA-2018:0270
https://access.redhat.com/errata/RHSA-2018:0271
https://access.redhat.com/errata/RHSA-2018:0275
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/security/cve/CVE-2017-12617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12617
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/24aea94807f940ee44aa550378dc903289039ddd
https://github.com/apache/tomcat/commit/31e99502e2c602449a2f8835bd23ade772b77333
https://github.com/apache/tomcat/commit/327e8a6644e188764325a013aa2725a60f1b37e5
https://github.com/apache/tomcat/commit/46dfedbc0523d7182be97f4244d7b6c942164485
https://github.com/apache/tomcat/commit/4cf7dab88282c8f3c92f0b961cdb0096e1d63e88
https://github.com/apache/tomcat/commit/506d862e7edfa991de198e0f2e4c4540830fa531
https://github.com/apache/tomcat/commit/512a3c3aecdb52de092c6bacddd71b85c4feda06
https://github.com/apache/tomcat/commit/74ad0e216c791454a318c1811300469eedc5c6f3
https://github.com/apache/tomcat/commit/a9dd96046d7acb0357c6b7b9e6cc70d186fae663
https://github.com/apache/tomcat/commit/b577f9a7996b92b650b1649af3c3bae11c120db9
https://github.com/apache/tomcat/commit/b7e0435d17aba69f16ae9e8a78ad0f1565b552af
https://github.com/apache/tomcat/commit/bbcbb749c75056a2781f37038d63e646fe972104
https://github.com/apache/tomcat/commit/c177e9668d1278710bdb14c0eb8d2702b3655f5a
https://github.com/apache/tomcat/commit/cf0b37beb0622abdf24acc7110daf883f3fe4f95
https://github.com/apache/tomcat/commit/d5b170705d24c386d76038e5989045c89795c28c
https://github.com/apache/tomcat/commit/e650cf1b83e441dbd3863f3f6b61c972cafce19e
https://github.com/apache/tomcat/commit/f1b85da754c4760787d68a99e839b50878140b57
https://github.com/apache/tomcat/commit/fd52f8601170b91f9d7162510e54563e5bf6bdfe
https://linux.oracle.com/cve/CVE-2017-12617.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2017-12617
https://security.netapp.com/advisory/ntap-20171018-0002
https://security.netapp.com/advisory/ntap-20171018-0002/
https://security.netapp.com/advisory/ntap-20180117-0002
https://security.netapp.com/advisory/ntap-20180117-0002/
https://support.f5.com/csp/article/K53173544
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03812en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20171110171954/http://www.securityfocus.com/bid/100954
https://web.archive.org/web/20201209024734/http://www.securitytracker.com/id/1039552
https://www.alphabot.com/security/blog/2017/java/Apache-Tomcat-RCE-CVE-2017-12617.html
https://www.cve.org/CVERecord?id=CVE-2017-12617
https://www.exploit-db.com/exploits/42966
https://www.exploit-db.com/exploits/42966/
https://www.exploit-db.com/exploits/43008
https://www.exploit-db.com/exploits/43008/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| tomcat-el-2.2-api |
CVE-2017-5647 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.arubanetworks.com/assets/alert/HPESBHF03730.txt
http://www.debian.org/security/2017/dsa-3842
http://www.debian.org/security/2017/dsa-3843
http://www.openwall.com/lists/oss-security/2017/04/10/24
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.securitytracker.com/id/1038218
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/security/cve/CVE-2017-5647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/864aa1199ad2cccc9a7e7c6b977f7d7f812c9910
https://github.com/apache/tomcat/commit/a4efd3ca1ccbdfc398136d76c0d8b7ad5a1e4905
https://github.com/apache/tomcat/commit/f5e06b8c743b1daa9eb5e817863958b6b320e044
https://github.com/apache/tomcat80/commit/ec10b8c785d1db91fe58946436f854dde04410fd
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03730en_us
https://linux.oracle.com/cve/CVE-2017-5647.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5796678c5a773c6f3ff57c178ac247d85ceca0dee9190ba48171451a%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5796678c5a773c6f3ff57c178ac247d85ceca0dee9190ba48171451a@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5647
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180614-0001
https://security.netapp.com/advisory/ntap-20180614-0001/
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170420114447/http://www.securitytracker.com/id/1038218
https://www.cve.org/CVERecord?id=CVE-2017-5647
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-el-2.2-api |
CVE-2017-5664 |
HIGH |
7.0.42-4.el7 |
7.0.69-12.el7_3 |
http://apt.inguza.net/wheezy-security/tomcat/tomcat8-CVE-2017-5664.patch
http://www.debian.org/security/2017/dsa-3891
http://www.debian.org/security/2017/dsa-3892
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/98888
http://www.securitytracker.com/id/1038641
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:1809
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/errata/RHSA-2017:2633
https://access.redhat.com/errata/RHSA-2017:2635
https://access.redhat.com/errata/RHSA-2017:2636
https://access.redhat.com/errata/RHSA-2017:2637
https://access.redhat.com/errata/RHSA-2017:2638
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/security/cve/CVE-2017-5664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/29893e66111d33cfe99dd01cb146317c0c262ef4
https://github.com/apache/tomcat/commit/3242efea525df01d15da6e90ea69a9a21b10b454
https://github.com/apache/tomcat/commit/3bfe9fb886598c4d8ecbe674216152006bbce456
https://github.com/apache/tomcat/commit/4545dcce444aa619374a659cb450dbbd0be3c921
https://github.com/apache/tomcat/commit/58b32048ce25cb812ae394dafb0cd57254c68155
https://github.com/apache/tomcat/commit/7d93527254d9e9371b342800617f20d13c8b85ad
https://github.com/apache/tomcat80/commit/25d3c0d93190ef165ecd6c744bc15b5059abfa8f
https://github.com/apache/tomcat80/commit/e070a31ec81b56377822e44883c64abb41f36a3b
https://linux.oracle.com/cve/CVE-2017-5664.html
https://linux.oracle.com/errata/ELSA-2017-3080.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5664
https://security.netapp.com/advisory/ntap-20171019-0002
https://security.netapp.com/advisory/ntap-20171019-0002/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.78
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.44
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.15
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170801120345/http://www.securitytracker.com/id/1038641
https://web.archive.org/web/20170805032345/http://www.securityfocus.com/bid/98888
https://www.cve.org/CVERecord?id=CVE-2017-5664
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-el-2.2-api |
CVE-2018-1336 |
HIGH |
7.0.42-4.el7 |
7.0.76-8.el7_5 |
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090435.GA60759%40minotaur.apache.org%3E
http://www.securityfocus.com/bid/104898
http://www.securitytracker.com/id/1041375
https://access.redhat.com/errata/RHEA-2018:2188
https://access.redhat.com/errata/RHEA-2018:2189
https://access.redhat.com/errata/RHSA-2018:2700
https://access.redhat.com/errata/RHSA-2018:2701
https://access.redhat.com/errata/RHSA-2018:2740
https://access.redhat.com/errata/RHSA-2018:2741
https://access.redhat.com/errata/RHSA-2018:2742
https://access.redhat.com/errata/RHSA-2018:2743
https://access.redhat.com/errata/RHSA-2018:2921
https://access.redhat.com/errata/RHSA-2018:2930
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2018:2945
https://access.redhat.com/errata/RHSA-2018:3768
https://access.redhat.com/security/cve/CVE-2018-1336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1336
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/156d76a6afeef440d14044a560d6ad1d029361c4
https://github.com/apache/tomcat/commit/92cd494555598e99dd691712e8ee426a2f9c2e93
https://github.com/apache/tomcat/commit/e00812b94e5830b2be3de04f4ae4ade38a700074
https://github.com/apache/tomcat80/commit/9e9b7fe1b5732277a26e437f1d32155de6208ef2
https://linux.oracle.com/cve/CVE-2018-1336.html
https://linux.oracle.com/errata/ELSA-2018-2921.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1336
https://security.netapp.com/advisory/ntap-20180817-0001
https://security.netapp.com/advisory/ntap-20180817-0001/
https://support.f5.com/csp/article/K73008537?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K73008537?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3723-1
https://usn.ubuntu.com/3723-1
https://usn.ubuntu.com/3723-1/
https://web.archive.org/web/20190703075545/http://www.securitytracker.com/id/1041375
https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104898
https://www.cve.org/CVERecord?id=CVE-2018-1336
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| tomcat-el-2.2-api |
CVE-2020-13935 |
HIGH |
7.0.42-4.el7 |
7.0.76-15.el7 |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3C39e4200c-6f4e-b85d-fe4b-a9c2bd5fdc3d%40apache.org%3E
http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37
https://access.redhat.com/security/cve/CVE-2020-13935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/12d715676038efbf9c728af10163f8277fc019d5
https://github.com/apache/tomcat/commit/1c1c77b0efb667cea80b532440b44cea1dc427c3
https://github.com/apache/tomcat/commit/40fa74c74822711ab878079d0a69f7357926723d
https://github.com/apache/tomcat/commit/4c04982870d6e730c38e21e58fb653b7cf723784
https://github.com/apache/tomcat/commit/f9f75c14678b68633f79030ddf4ff827f014cc84
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-13935.html
https://linux.oracle.com/errata/ELSA-2020-4004.html
https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2020-13935
https://security.netapp.com/advisory/ntap-20200724-0003
https://security.netapp.com/advisory/ntap-20200724-0003/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4448-1
https://ubuntu.com/security/notices/USN-4596-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://usn.ubuntu.com/4596-1
https://usn.ubuntu.com/4596-1/
https://www.cve.org/CVERecord?id=CVE-2020-13935
https://www.debian.org/security/2020/dsa-4727
https://www.openwall.com/lists/oss-security/2020/07/14/3
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-el-2.2-api |
CVE-2020-1938 |
HIGH |
7.0.42-4.el7 |
7.0.76-11.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html
http://support.blackberry.com/kb/articleDetail?articleNumber=000062739
https://access.redhat.com/security/cve/CVE-2020-1938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1938
https://linux.oracle.com/cve/CVE-2020-1938.html
https://linux.oracle.com/errata/ELSA-2020-0912.html
https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a%40%3Cusers.tomee.apache.org%3E
https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a@%3Cusers.tomee.apache.org%3E
https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7%40%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E
https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3@%3Ccommits.tomee.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B
https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/
https://nvd.nist.gov/vuln/detail/CVE-2020-1938
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20200226-0002
https://security.netapp.com/advisory/ntap-20200226-0002/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31
https://www.cnvd.org.cn/webinfo/show/5415
https://www.cve.org/CVERecord?id=CVE-2020-1938
https://www.debian.org/security/2020/dsa-4673
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487
|
| tomcat-el-2.2-api |
CVE-2020-9484 |
HIGH |
7.0.42-4.el7 |
7.0.76-12.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202005.mbox/%3Ce3a0a517-bf82-ba62-0af6-24b83ea0e4e2%40apache.org%3E
http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html
http://seclists.org/fulldisclosure/2020/Jun/6
http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M5
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.104
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.55
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.35
http://www.openwall.com/lists/oss-security/2021/03/01/2
https://access.redhat.com/security/cve/CVE-2020-9484
https://bugzilla.suse.com/show_bug.cgi?id=1171928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222 (9.0.35)
https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222.patch
https://github.com/apache/tomcat/commit/4785433a226a20df6acbea49296e1ce7e23de453
https://github.com/apache/tomcat/commit/53e30390943c18fca0c9e57dbcc14f1c623cfd06 (7.0.104)
https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4
https://github.com/apache/tomcat/commit/74b105657ffbd1d1de80455f03446c3bbf30d1f5
https://github.com/apache/tomcat/commit/93f0cc403a9210d469afc2bd9cf03ab3251c6f35
https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b
https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b (10.0.0-M5)
https://github.com/apache/tomcat/commit/ec08af18d0f9ddca3f2d800ef66fe7fd20afef2f (8.5.55)
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-9484.html
https://linux.oracle.com/errata/ELSA-2020-2530.html
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/05/msg00020.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N
https://nvd.nist.gov/vuln/detail/CVE-2020-9484
https://security.gentoo.org/glsa/202006-21
https://security.netapp.com/advisory/ntap-20200528-0005
https://security.netapp.com/advisory/ntap-20200528-0005/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4448-1
https://ubuntu.com/security/notices/USN-4596-1
https://ubuntu.com/security/notices/USN-5360-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://usn.ubuntu.com/4596-1
https://usn.ubuntu.com/4596-1/
https://www.cve.org/CVERecord?id=CVE-2020-9484
https://www.debian.org/security/2020/dsa-4727
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-el-2.2-api |
CVE-2023-34981 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-34981
https://bz.apache.org/bugzilla/show_bug.cgi?id=66512
https://bz.apache.org/bugzilla/show_bug.cgi?id=66591
https://github.com/advisories/GHSA-mppv-79ch-vw6q
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2214c8030522aa9b2a367dfa5d9acff1a03666ae
https://github.com/apache/tomcat/commit/2f0ca2378415f4cf0748f4bc8fa955f41f803fa5
https://github.com/apache/tomcat/commit/739c7381aed22b7636351caf885ddc519ab6b442
https://github.com/apache/tomcat/commit/f0742f47b98aca943097f7f88e0d1163f57527e3
https://lists.apache.org/thread/j1ksjh9m9gx1q60rtk1sbzmxhvj5h5qz
https://nvd.nist.gov/vuln/detail/CVE-2023-34981
https://security.netapp.com/advisory/ntap-20230714-0003
https://security.netapp.com/advisory/ntap-20230714-0003/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-34981
|
| tomcat-el-2.2-api |
CVE-2023-46589 |
HIGH |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/11/28/2
https://access.redhat.com/errata/RHSA-2024:1134
https://access.redhat.com/security/cve/CVE-2023-46589
https://bugzilla.redhat.com/2252050
https://bugzilla.redhat.com/show_bug.cgi?id=2252050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46589
https://errata.almalinux.org/9/ALSA-2024-1134.html
https://errata.rockylinux.org/RLSA-2024:0539
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6f181e1062a472bc5f0234980f66cbde42c1041b
https://github.com/apache/tomcat/commit/7a2d8818fcea0b51747a67af9510ce7977245ebd
https://github.com/apache/tomcat/commit/aa92971e879a519384c517febc39fd04c48d4642
https://github.com/apache/tomcat/commit/b5776d769bffeade865061bc8ecbeb2b56167b08
https://linux.oracle.com/cve/CVE-2023-46589.html
https://linux.oracle.com/errata/ELSA-2024-1134.html
https://lists.apache.org/thread/0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr
https://lists.debian.org/debian-lts-announce/2024/01/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2023-46589
https://security.netapp.com/advisory/ntap-20231214-0009
https://security.netapp.com/advisory/ntap-20231214-0009/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-46589
https://www.openwall.com/lists/oss-security/2023/11/28/2
|
| tomcat-el-2.2-api |
CVE-2024-23672 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-23672
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0052b374684b613b0c849899b325ebe334ac6501
https://github.com/apache/tomcat/commit/3631adb1342d8bbd8598802a12b63ad02c37d591
https://github.com/apache/tomcat/commit/52d6650e062d880704898d7d8c1b2b7a3efe8068
https://github.com/apache/tomcat/commit/b0e3b1bd78de270d53e319d7cb79eb282aa53cb9
https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f
https://nvd.nist.gov/vuln/detail/CVE-2024-23672
https://www.cve.org/CVERecord?id=CVE-2024-23672
|
| tomcat-el-2.2-api |
CVE-2024-24549 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-24549
https://lists.apache.org/thread/4c50rmomhbbsdgfjsgwlb51xdwfjdcvg
https://nvd.nist.gov/vuln/detail/CVE-2024-24549
https://www.cve.org/CVERecord?id=CVE-2024-24549
|
| tomcat-el-2.2-api |
CVE-2013-4286 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://advisories.mageia.org/MGASA-2014-0148.html
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2014-0343.html
http://rhn.redhat.com/errata/RHSA-2014-0344.html
http://rhn.redhat.com/errata/RHSA-2014-0345.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/57675
http://secunia.com/advisories/59036
http://secunia.com/advisories/59675
http://secunia.com/advisories/59722
http://secunia.com/advisories/59724
http://secunia.com/advisories/59733
http://secunia.com/advisories/59873
http://svn.apache.org/viewvc?view=revision&revision=1521829
http://svn.apache.org/viewvc?view=revision&revision=1521854
http://svn.apache.org/viewvc?view=revision&revision=1552565
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21667883
http://www-01.ibm.com/support/docview.wss?uid=swg21675886
http://www-01.ibm.com/support/docview.wss?uid=swg21677147
http://www-01.ibm.com/support/docview.wss?uid=swg21678113
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65773
http://www.ubuntu.com/usn/USN-2130-1
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2013-4286
https://bugzilla.redhat.com/show_bug.cgi?id=1069921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/41b90b6ebc3e7f898a5a87d197ddf63790d33315
https://github.com/apache/tomcat/commit/7c040003f1387795356605566be7870cf70e05dc
https://github.com/apache/tomcat/commit/bcce3e4997a4ed06fe03e2517443f3ad8ade2dfa
https://github.com/apache/tomcat/commit/d0b3e252eb168fafbfb4c3efc16d4192fc8fad6c
https://github.com/apache/tomcat80/commit/ff00954b78e6484e40f323c0cef2e6d95c2882b9
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2013-4286.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-4286
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://ubuntu.com/security/notices/USN-2130-1
https://web.archive.org/web/20140724174205/http://secunia.com/advisories/57675
https://web.archive.org/web/20140804172142/http://secunia.com/advisories/59036
https://web.archive.org/web/20141230041748/http://seclists.org/fulldisclosure/2014/Dec/23
https://web.archive.org/web/20160317145515/http://www.securityfocus.com/archive/1/534161/100/0/threaded
https://web.archive.org/web/20160729061926/http://www.securityfocus.com/bid/65773
https://web.archive.org/web/20161014054543/http://www-01.ibm.com/support/docview.wss?uid=swg21678231
https://web.archive.org/web/20161014054838/http://www-01.ibm.com/support/docview.wss?uid=swg21677147
https://web.archive.org/web/20161014054913/http://www-01.ibm.com/support/docview.wss?uid=swg21678113
https://web.archive.org/web/20161014054948/http://www-01.ibm.com/support/docview.wss?uid=swg21667883
https://web.archive.org/web/20161024215453/http://secunia.com/advisories/59873
https://web.archive.org/web/20161024215639/http://secunia.com/advisories/59722
https://web.archive.org/web/20161024215804/http://secunia.com/advisories/59675
https://web.archive.org/web/20161024220018/http://secunia.com/advisories/59724
https://web.archive.org/web/20161024220034/http://secunia.com/advisories/59733
https://www.cve.org/CVERecord?id=CVE-2013-4286
|
| tomcat-el-2.2-api |
CVE-2013-4322 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://advisories.mageia.org/MGASA-2014-0148.html
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/59036
http://secunia.com/advisories/59675
http://secunia.com/advisories/59722
http://secunia.com/advisories/59724
http://secunia.com/advisories/59873
http://svn.apache.org/viewvc?view=revision&revision=1521834
http://svn.apache.org/viewvc?view=revision&revision=1521864
http://svn.apache.org/viewvc?view=revision&revision=1549522
http://svn.apache.org/viewvc?view=revision&revision=1549523
http://svn.apache.org/viewvc?view=revision&revision=1556540
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21667883
http://www-01.ibm.com/support/docview.wss?uid=swg21675886
http://www-01.ibm.com/support/docview.wss?uid=swg21677147
http://www-01.ibm.com/support/docview.wss?uid=swg21678113
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65767
http://www.ubuntu.com/usn/USN-2130-1
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2013-4322
https://bugzilla.redhat.com/show_bug.cgi?id=1069905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/70dc3b279f7c99136c2c51bce8812508b4893c8b
https://github.com/apache/tomcat/commit/72613a0e2f88af789c2acc7093c82ff02b95b6d1
https://github.com/apache/tomcat/commit/a91516b80deaf1d0c6e04a7931765fdac34c4ccd
https://github.com/apache/tomcat/commit/b8cb9f5f91e9210ca107fd80f3e6acd47531daa7
https://github.com/apache/tomcat/commit/bed3a1a0d06a3c787183c6e90f326bbe17e49dd4
https://github.com/apache/tomcat/commit/d6a9898125f34e593de426e8c7dabb0f224fc00f
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2013-4322.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-4322
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://ubuntu.com/security/notices/USN-2130-1
https://web.archive.org/web/20140315211337/http://www.securityfocus.com/bid/65767
https://web.archive.org/web/20150503090027/http://www.securityfocus.com/archive/1/534161/100/0/threaded
https://web.archive.org/web/20151023203543/http://secunia.com/advisories/59873
https://web.archive.org/web/20161024215620/http://secunia.com/advisories/59036
https://web.archive.org/web/20161024215639/http://secunia.com/advisories/59722
https://web.archive.org/web/20161024215804/http://secunia.com/advisories/59675
https://web.archive.org/web/20161024220018/http://secunia.com/advisories/59724
https://www.cve.org/CVERecord?id=CVE-2013-4322
|
| tomcat-el-2.2-api |
CVE-2014-0075 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/59121
http://secunia.com/advisories/59616
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://secunia.com/advisories/60793
http://svn.apache.org/viewvc?view=revision&revision=1578337
http://svn.apache.org/viewvc?view=revision&revision=1578341
http://svn.apache.org/viewvc?view=revision&revision=1579262
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21680603
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.novell.com/support/kb/doc.php?id=7010166
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67671
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/b6974571c122f6a1e7ec74a90fa212976fa7b0ed
https://github.com/apache/tomcat/commit/f646a5acd5e32d6f5a2d9bf1d94ca66b65477675
https://github.com/apache/tomcat80/commit/d49a03728ac7e3c800b1b0ce0eeccd8a5a21bb91
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0075.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0075
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0075
|
| tomcat-el-2.2-api |
CVE-2014-0099 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/138
http://seclists.org/fulldisclosure/2014/May/140
http://secunia.com/advisories/59121
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://secunia.com/advisories/60793
http://svn.apache.org/viewvc?view=revision&revision=1578812
http://svn.apache.org/viewvc?view=revision&revision=1578814
http://svn.apache.org/viewvc?view=revision&revision=1580473
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21680603
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.securityfocus.com/archive/1/532218/100/0/threaded
http://www.securityfocus.com/archive/1/532221/100/0/threaded
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67668
http://www.securitytracker.com/id/1030302
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/184cdc0d3f03f5737e12d21fff246d7285034597
https://github.com/apache/tomcat/commit/fffd63a3bd3a5475379b7c074820a5463b7663b3
https://github.com/apache/tomcat80/commit/990de53ab923c126f7402090a4ca53df4bb80cbd
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0099.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0099
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0099
|
| tomcat-el-2.2-api |
CVE-2014-0227 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-2.el7_1 |
http://advisories.mageia.org/MGASA-2015-0081.html
http://archives.neohapsis.com/archives/bugtraq/2015-02/0067.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=143393515412274&w=2
http://marc.info/?l=bugtraq&m=143403519711434&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://rhn.redhat.com/errata/RHSA-2015-0983.html
http://rhn.redhat.com/errata/RHSA-2015-0991.html
http://svn.apache.org/viewvc?view=revision&revision=1600984
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/72717
http://www.securitytracker.com/id/1032791
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/security/cve/CVE-2014-0227
https://bugzilla.redhat.com/show_bug.cgi?id=1109196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227
https://linux.oracle.com/cve/CVE-2014-0227.html
https://linux.oracle.com/errata/ELSA-2015-0991.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0227
https://source.jboss.org/changelog/JBossWeb?cs=2455
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.43
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-0227
|
| tomcat-el-2.2-api |
CVE-2014-7810 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2015-1621.html
http://rhn.redhat.com/errata/RHSA-2015-1622.html
http://rhn.redhat.com/errata/RHSA-2016-0492.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://svn.apache.org/viewvc?view=revision&revision=1644018
http://svn.apache.org/viewvc?view=revision&revision=1645642
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.44
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.59
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.17
http://www.debian.org/security/2015/dsa-3428
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/74665
http://www.securitytracker.com/id/1032330
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/security/cve/CVE-2014-7810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://linux.oracle.com/cve/CVE-2014-7810.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-7810
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-7810
|
| tomcat-el-2.2-api |
CVE-2015-5351 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://packetstormsecurity.com/files/135882/Apache-Tomcat-CSRF-Token-Leak.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/148
http://svn.apache.org/viewvc?view=revision&revision=1720652
http://svn.apache.org/viewvc?view=revision&revision=1720655
http://svn.apache.org/viewvc?view=revision&revision=1720658
http://svn.apache.org/viewvc?view=revision&revision=1720660
http://svn.apache.org/viewvc?view=revision&revision=1720661
http://svn.apache.org/viewvc?view=revision&revision=1720663
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/83330
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5351
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351
https://github.com/apache/tomcat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5351.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5351
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://softwaresupport.hpe.com/document/-/facetsearch/document/KM02978021
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20161020161943/http://www.securityfocus.com/bid/83330
https://www.cve.org/CVERecord?id=CVE-2015-5351
|
| tomcat-el-2.2-api |
CVE-2016-0714 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/145
http://svn.apache.org/viewvc?view=revision&revision=1725263
http://svn.apache.org/viewvc?view=revision&revision=1725914
http://svn.apache.org/viewvc?view=revision&revision=1726196
http://svn.apache.org/viewvc?view=revision&revision=1726203
http://svn.apache.org/viewvc?view=revision&revision=1726923
http://svn.apache.org/viewvc?view=revision&revision=1727034
http://svn.apache.org/viewvc?view=revision&revision=1727166
http://svn.apache.org/viewvc?view=revision&revision=1727182
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83327
http://www.securitytracker.com/id/1035069
http://www.securitytracker.com/id/1037640
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0714
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/50f1b1da794cd93b70ab5456d3c2c984408e1506
https://github.com/apache/tomcat/commit/79e8ad03404c131009811855f9a30d8d01c0c736
https://github.com/apache/tomcat/commit/824eb1d1ad922e7652ecf51adb2b9eebb5bb88b5
https://github.com/apache/tomcat/commit/e1b1002129fea4033329f6f619ba219527bbbd40
https://github.com/apache/tomcat/commit/f626da75fd59da82b14dee7b8cc46ad51eefdbe5
https://github.com/apache/tomcat/commit/ff1b659dc366a2ad47cd8f7e3544c796a1b15e46
https://github.com/apache/tomcat80/commit/2e5cc28052e84ba45196949ba602484221bbf33c
https://github.com/apache/tomcat80/commit/5430f30c79383e4d2d87785468905fcb00bace58
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2016-0714.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0714
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20170204045529/http://www.securityfocus.com/bid/83327
https://web.archive.org/web/20170601064840/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20170927131230/http://www.securitytracker.com/id/1037640
https://www.cve.org/CVERecord?id=CVE-2016-0714
|
| tomcat-el-2.2-api |
CVE-2016-0763 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179356.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/147
http://svn.apache.org/viewvc?view=revision&revision=1725926
http://svn.apache.org/viewvc?view=revision&revision=1725929
http://svn.apache.org/viewvc?view=revision&revision=1725931
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/83326
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0763
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/76ebc9007567c8326217dd94844540e1e27d8468
https://github.com/apache/tomcat/commit/c08641da04d31f730b56b8675301e55db97dfe88
https://github.com/apache/tomcat80/commit/0531f7aeff1999d362e0a68512a3517f2cf1a6ae
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
https://linux.oracle.com/cve/CVE-2016-0763.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0763
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160314101138/http://www.securityfocus.com/bid/83326
https://web.archive.org/web/20160404202803/http://www.securitytracker.com/id/1035069
https://www.cve.org/CVERecord?id=CVE-2016-0763
|
| tomcat-el-2.2-api |
CVE-2016-3092 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://jvn.jp/en/jp/JVN89379547/index.html
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E
http://markmail.org/message/oyxfv73jb2g7rjg3
http://rhn.redhat.com/errata/RHSA-2016-2068.html
http://rhn.redhat.com/errata/RHSA-2016-2069.html
http://rhn.redhat.com/errata/RHSA-2016-2070.html
http://rhn.redhat.com/errata/RHSA-2016-2071.html
http://rhn.redhat.com/errata/RHSA-2016-2072.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://svn.apache.org/viewvc?view=revision&revision=1743480
http://svn.apache.org/viewvc?view=revision&revision=1743722
http://svn.apache.org/viewvc?view=revision&revision=1743738
http://svn.apache.org/viewvc?view=revision&revision=1743742
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3609
http://www.debian.org/security/2016/dsa-3611
http://www.debian.org/security/2016/dsa-3614
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91453
http://www.securitytracker.com/id/1036427
http://www.securitytracker.com/id/1036900
http://www.securitytracker.com/id/1037029
http://www.securitytracker.com/id/1039606
http://www.ubuntu.com/usn/USN-3024-1
http://www.ubuntu.com/usn/USN-3027-1
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/security/cve/CVE-2016-3092
https://bugzilla.redhat.com/show_bug.cgi?id=1349468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092
https://github.com/advisories/GHSA-fvm3-cfvj-gxqq
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759
https://linux.oracle.com/cve/CVE-2016-3092.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-3092
https://security.gentoo.org/glsa/201705-09
https://security.gentoo.org/glsa/202107-39
https://security.netapp.com/advisory/ntap-20190212-0001
https://security.netapp.com/advisory/ntap-20190212-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://ubuntu.com/security/notices/USN-3027-1
https://web.archive.org/web/20160726114129/http://www.securitytracker.com/id/1036427
https://web.archive.org/web/20160924080828/http://www.securityfocus.com/bid/91453
https://web.archive.org/web/20170317103106/http://www.securitytracker.com/id/1037029
https://web.archive.org/web/20171103224941/http://www.securitytracker.com/id/1036900
https://web.archive.org/web/20171111060434/http://www.securitytracker.com/id/1039606
https://www.cve.org/CVERecord?id=CVE-2016-3092
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| tomcat-el-2.2-api |
CVE-2016-5388 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
http://rhn.redhat.com/errata/RHSA-2016-1624.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/91818
http://www.securitytracker.com/id/1036331
https://access.redhat.com/errata/RHSA-2016:1624
https://access.redhat.com/errata/RHSA-2016:1635
https://access.redhat.com/errata/RHSA-2016:1636
https://access.redhat.com/errata/RHSA-2016:2045
https://access.redhat.com/errata/RHSA-2016:2046
https://access.redhat.com/security/cve/CVE-2016-5388
https://bugzilla.redhat.com/show_bug.cgi?id=1353809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/1b91e91194a095ea922f96d1dccddf6fbc446e54
https://github.com/apache/tomcat/commit/880250877b0643956435282afb9c111450cfff4c
https://github.com/apache/tomcat/commit/fb3569fbb9a2f55459aa8e1e22bc35a737e66329
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5388.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5388
https://rhn.redhat.com/errata/RHSA-2016-1624.html
https://rhn.redhat.com/errata/RHSA-2016-2045.html
https://rhn.redhat.com/errata/RHSA-2016-2046.html
https://tomcat.apache.org/tomcat-7.0-doc/changelog.html
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4791-1
https://www.apache.org/security/asf-httpoxy-response.txt
https://www.cve.org/CVERecord?id=CVE-2016-5388
https://www.kb.cert.org/vuls/id/797896
|
| tomcat-el-2.2-api |
CVE-2016-6816 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-11.el7_3 |
http://rhn.redhat.com/errata/RHSA-2017-0244.html
http://rhn.redhat.com/errata/RHSA-2017-0245.html
http://rhn.redhat.com/errata/RHSA-2017-0246.html
http://rhn.redhat.com/errata/RHSA-2017-0247.html
http://rhn.redhat.com/errata/RHSA-2017-0250.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-0527.html
http://www.debian.org/security/2016/dsa-3738
http://www.openwall.com/lists/oss-security/2016/11/22/17
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/94461
http://www.securitytracker.com/id/1037332
https://access.redhat.com/articles/2991951
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:0935
https://access.redhat.com/security/cve/CVE-2016-6816
https://access.redhat.com/solutions/2891171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816
https://github.com/apache/tomcat/commit/516bda676ac8d0284da3e0295a7df70391315360
https://github.com/apache/tomcat/commit/cdc0a935c2173aff60039a0b85e57a461381107c
https://github.com/apache/tomcat/commit/f96f5751d418ae5a2f550be040daf9c5f7d99256
https://github.com/apache/tomcat80/commit/779d5d34e68e50d2f721897050b147106992f566
https://linux.oracle.com/cve/CVE-2016-6816.html
https://linux.oracle.com/errata/ELSA-2017-0935.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6816
https://security.netapp.com/advisory/ntap-20180607-0001
https://security.netapp.com/advisory/ntap-20180607-0001/
https://svn.apache.org/viewvc?view=revision&revision=1767641
https://svn.apache.org/viewvc?view=revision&revision=1767645
https://svn.apache.org/viewvc?view=revision&revision=1767653
https://svn.apache.org/viewvc?view=revision&revision=1767675
https://svn.apache.org/viewvc?view=revision&revision=1767683
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161204121236/http://www.securityfocus.com/bid/94461
https://web.archive.org/web/20170929085438/http://www.securitytracker.com/id/1037332
https://www.cve.org/CVERecord?id=CVE-2016-6816
https://www.exploit-db.com/exploits/41783
https://www.exploit-db.com/exploits/41783/
|
| tomcat-el-2.2-api |
CVE-2017-12616 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.securityfocus.com/bid/100897
http://www.securitytracker.com/id/1039393
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/security/cve/CVE-2017-12616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12616
https://github.com/apache/tomcat
https://lists.apache.org/thread.html/1df9b4552464caa42047062fe7175da0da06c18ecc8daf99258bbda6%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1df9b4552464caa42047062fe7175da0da06c18ecc8daf99258bbda6@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2017-12616
https://security.netapp.com/advisory/ntap-20171018-0001
https://security.netapp.com/advisory/ntap-20171018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://www.cve.org/CVERecord?id=CVE-2017-12616
https://www.synology.com/support/security/Synology_SA_17_54_Tomcat
|
| tomcat-el-2.2-api |
CVE-2017-5648 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-12.el7_3 |
http://www.debian.org/security/2017/dsa-3842
http://www.debian.org/security/2017/dsa-3843
http://www.openwall.com/lists/oss-security/2017/04/10/23
http://www.openwall.com/lists/oss-security/2020/07/20/8
http://www.securityfocus.com/bid/97530
http://www.securitytracker.com/id/1038220
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:1809
https://access.redhat.com/security/cve/CVE-2017-5648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5648
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0f7b9465d594b9814e1853d1e3a6e3aa51a21610
https://github.com/apache/tomcat/commit/6bb36dfdf6444efda074893dff493b9eb3648808
https://github.com/apache/tomcat/commit/dfa40863421d7681fed893b4256666491887e38c
https://github.com/apache/tomcat80/commit/6d73b079c55ee25dea1bbd0556bb568a4247dacd
https://linux.oracle.com/cve/CVE-2017-5648.html
https://linux.oracle.com/errata/ELSA-2017-1809.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5648
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180614-0001
https://security.netapp.com/advisory/ntap-20180614-0001/
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170417124117/http://www.securityfocus.com/bid/97530
https://web.archive.org/web/20170420115120/http://www.securitytracker.com/id/1038220
https://www.cve.org/CVERecord?id=CVE-2017-5648
|
| tomcat-el-2.2-api |
CVE-2017-7674 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.debian.org/security/2017/dsa-3974
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/100280
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/security/cve/CVE-2017-7674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7674
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/52382ebfbce20a98b01cd9d37184a12703987a5a
https://github.com/apache/tomcat/commit/9044c1672bbe4b2cf4c55028cc8b977cc62650e7
https://github.com/apache/tomcat/commit/b94478d45b7e1fc06134a785571f78772fa30fed
https://github.com/apache/tomcat80/commit/f52c242d92d4563dd1226dcc993ec37370ba9ce3
https://linux.oracle.com/cve/CVE-2017-7674.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/22b4bb077502f847e2b9fcf00b96e81e734466ab459780ff73b60c0f%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/22b4bb077502f847e2b9fcf00b96e81e734466ab459780ff73b60c0f@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread/bol4f8wyjfsbo135tw9gy49o5nf8qpth
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7674
https://security.netapp.com/advisory/ntap-20180614-0003
https://security.netapp.com/advisory/ntap-20180614-0003/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://svn.apache.org/viewvc?view=revision&revision=1795816
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20171115015045/http://www.securityfocus.com/bid/100280
https://web.archive.org/web/20210116171055/http://www.securityfocus.com/bid/100280
https://www.cve.org/CVERecord?id=CVE-2017-7674
|
| tomcat-el-2.2-api |
CVE-2018-11784 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.91
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.34
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.12
http://www.securityfocus.com/bid/105524
https://access.redhat.com/errata/RHSA-2019:0130
https://access.redhat.com/errata/RHSA-2019:0131
https://access.redhat.com/errata/RHSA-2019:0485
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/security/cve/CVE-2018-11784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11784
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/advisories/GHSA-5q99-f34m-67gc
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/b76e1dfb3dec3789cc700f8d022c872eb947a221
https://github.com/apache/tomcat/commit/efb860b3ff8ebcf606199b8d0d432f76898040da
https://github.com/apache/tomcat/commit/f9f147359b7c95511b64cd99bbc47917c01b3879
https://kc.mcafee.com/corporate/index?page=content&id=SB10284
https://linux.oracle.com/cve/CVE-2018-11784.html
https://linux.oracle.com/errata/ELSA-2019-1529.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP
https://nvd.nist.gov/vuln/detail/CVE-2018-11784
https://seclists.org/bugtraq/2019/Dec/43
https://security.netapp.com/advisory/ntap-20181014-0002
https://security.netapp.com/advisory/ntap-20181014-0002/
https://ubuntu.com/security/notices/USN-3787-1
https://usn.ubuntu.com/3787-1
https://usn.ubuntu.com/3787-1/
https://web.archive.org/web/20200227030058/http://www.securityfocus.com/bid/105524
https://www.cve.org/CVERecord?id=CVE-2018-11784
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat-el-2.2-api |
CVE-2018-1304 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103170
http://www.securitytracker.com/id/1040427
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:1320
https://access.redhat.com/errata/RHSA-2018:1447
https://access.redhat.com/errata/RHSA-2018:1448
https://access.redhat.com/errata/RHSA-2018:1449
https://access.redhat.com/errata/RHSA-2018:1450
https://access.redhat.com/errata/RHSA-2018:1451
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-1304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1304
https://github.com/advisories/GHSA-6rxj-58jh-436r
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2d69fde135302e8cff984bb2131ec69f2e396964
https://github.com/apache/tomcat/commit/5af7c13cff7cc8366c5997418e820989fabb8f48
https://github.com/apache/tomcat/commit/723ea6a5bc5e7bc49e5ef84273c3b3c164a6a4fd
https://github.com/apache/tomcat80/commit/9e700b93e3bf5c605267d20568a964169f9e0b79
https://linux.oracle.com/cve/CVE-2018-1304.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1304
https://security.netapp.com/advisory/ntap-20180706-0001
https://security.netapp.com/advisory/ntap-20180706-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20200227102806/http://www.securityfocus.com/bid/103170
https://web.archive.org/web/20200516074457/http://www.securitytracker.com/id/1040427
https://www.cve.org/CVERecord?id=CVE-2018-1304
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-el-2.2-api |
CVE-2018-1305 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103144
http://www.securitytracker.com/id/1040428
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:1320
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-1305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1305
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2349801827f09fb6582a8afdeca704294106ad9a
https://github.com/apache/tomcat/commit/2aac69f694d42d9219eb27018b3da0ae1bdd73ab
https://github.com/apache/tomcat/commit/3e54b2a6314eda11617ff7a7b899c251e222b1a1
https://github.com/apache/tomcat/commit/4d637bc3986e5d09b9363e2144b8ba74fa6eac3a
https://github.com/apache/tomcat/commit/c63b96d72cd39287e17b2ba698f4eee0ba508073
https://github.com/apache/tomcat/commit/de6b4fd58b64828f374503b9ec76a12017b92895
https://linux.oracle.com/cve/CVE-2018-1305.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1305
https://security.netapp.com/advisory/ntap-20180706-0001
https://security.netapp.com/advisory/ntap-20180706-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20200227030042/http://www.securityfocus.com/bid/103144
https://web.archive.org/web/20200516094320/http://www.securitytracker.com/id/1040428
https://www.cve.org/CVERecord?id=CVE-2018-1305
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-el-2.2-api |
CVE-2018-8014 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.89
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.53
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.32
http://tomcat.apache.org/security-9.html
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.9
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104203
http://www.securitytracker.com/id/1040998
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:2469
https://access.redhat.com/errata/RHSA-2018:2470
https://access.redhat.com/errata/RHSA-2018:3768
https://access.redhat.com/errata/RHSA-2019:0450
https://access.redhat.com/errata/RHSA-2019:0451
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-8014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8014
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/advisories/GHSA-r4x2-3cq5-hqvp
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/5877390a9605f56d9bd6859a54ccbfb16374a78b
https://github.com/apache/tomcat/commit/60f596a21fd6041335a3a1a4015d4512439cecb5
https://github.com/apache/tomcat/commit/d83a76732e6804739b81d8b2056365307637b42d
https://github.com/apache/tomcat80/commit/2c9d8433bd3247a2856d4b2555447108758e813e
https://linux.oracle.com/cve/CVE-2018-8014.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://nvd.nist.gov/vuln/detail/CVE-2018-8014
https://seclists.org/bugtraq/2019/Dec/43
https://security.netapp.com/advisory/ntap-20181018-0002
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20181017143233/http://www.securityfocus.com/bid/104203
https://web.archive.org/web/20201207080723/http://www.securitytracker.com/id/1041888
https://web.archive.org/web/20201207101131/http://www.securitytracker.com/id/1040998
https://www.cve.org/CVERecord?id=CVE-2018-8014
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| tomcat-el-2.2-api |
CVE-2022-23181 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-23181
https://github.com/apache/tomcat
https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9
https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23181
https://security.netapp.com/advisory/ntap-20220217-0010
https://security.netapp.com/advisory/ntap-20220217-0010/
https://www.cve.org/CVERecord?id=CVE-2022-23181
https://www.debian.org/security/2022/dsa-5265
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
|
| tomcat-el-2.2-api |
CVE-2023-24998 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/05/22/1
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-24998
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://commons.apache.org/proper/commons-fileupload/security-reports.html
https://commons.apache.org/proper/commons-fileupload/security-reports.html#Fixed_in_Apache_Commons_FileUpload_1.5
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/commons-fileupload
https://github.com/apache/commons-fileupload/commit/e20c04990f7420ca917e96a84cec58b13a1b3d17
https://github.com/apache/tomcat/commit/8a2285f13affa961cc65595aad999db5efae45ce
https://github.com/apache/tomcat/commit/9ca96c8c1eba86c0aaa2e6be581ba2a7d4d4ae6e
https://github.com/apache/tomcat/commit/cf77cc545de0488fb89e24294151504a7432df74
https://github.com/apache/tomcat/commit/d53d8e7f77042cc32a3b98f589496a1ef5088e38
https://linux.oracle.com/cve/CVE-2023-24998.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-24998
https://security.gentoo.org/glsa/202305-37
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-24998
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-el-2.2-api |
CVE-2023-28708 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-28708
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://bz.apache.org/bugzilla/show_bug.cgi?id=66471
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3b51230764da595bb19e8d0962dd8c69ab40dfab
https://github.com/apache/tomcat/commit/5b72c94e8b2c4ada63a1d91dc527bf4d8fd1f510
https://github.com/apache/tomcat/commit/c64d496dda1560b5df113be55fbfaefec349b50f
https://github.com/apache/tomcat/commit/f509bbf31fc00abe3d9f25ebfabca5e05173da5b
https://linux.oracle.com/cve/CVE-2023-28708.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/hdksc59z3s7tm39x0pp33mtwdrt8qr67
https://nvd.nist.gov/vuln/detail/CVE-2023-28708
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-28708
|
| tomcat-el-2.2-api |
CVE-2023-28709 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/05/22/1
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-28709
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-28709.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j
https://nvd.nist.gov/vuln/detail/CVE-2023-28709
https://security.gentoo.org/glsa/202305-37
https://security.netapp.com/advisory/ntap-20230616-0004
https://security.netapp.com/advisory/ntap-20230616-0004/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-28709
https://www.debian.org/security/2023/dsa-5521
|
| tomcat-el-2.2-api |
CVE-2023-41080 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-41080
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/4998ad745b67edeadefe541c94ed029b53933d3b
https://github.com/apache/tomcat/commit/77c0ce2d169efa248b64b992e547aad549ec906b
https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27
https://github.com/apache/tomcat/commit/e3703c9abb8fe0d5602f6ba8a8f11d4b6940815a
https://linux.oracle.com/cve/CVE-2023-41080.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-41080
https://security.netapp.com/advisory/ntap-20230921-0006
https://security.netapp.com/advisory/ntap-20230921-0006/
https://www.cve.org/CVERecord?id=CVE-2023-41080
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-el-2.2-api |
CVE-2023-42794 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/8
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-42794
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-42794.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/vvbr2ms7lockj1hlhz5q3wmxb2mwcw82
https://nvd.nist.gov/vuln/detail/CVE-2023-42794
https://www.cve.org/CVERecord?id=CVE-2023-42794
|
| tomcat-el-2.2-api |
CVE-2023-42795 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/9
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-42795
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-42795.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/065jfyo583490r9j2v73nhpyxdob56lw
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-42795
https://security.netapp.com/advisory/ntap-20231103-0007
https://security.netapp.com/advisory/ntap-20231103-0007/
https://www.cve.org/CVERecord?id=CVE-2023-42795
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-el-2.2-api |
CVE-2023-45648 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/10
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-45648
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/59583245639d8c42ae0009f4a4a70464d3ea70a0
https://github.com/apache/tomcat/commit/8ecff306507be8e4fd3adee1ae5de1ea6661a8f4
https://github.com/apache/tomcat/commit/eb5c094e5560764cda436362254997511a3ca1f6
https://linux.oracle.com/cve/CVE-2023-45648.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdp
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-45648
https://security.netapp.com/advisory/ntap-20231103-0007
https://security.netapp.com/advisory/ntap-20231103-0007/
https://www.cve.org/CVERecord?id=CVE-2023-45648
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-el-2.2-api |
CVE-2014-0096 |
LOW |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/135
http://secunia.com/advisories/59121
http://secunia.com/advisories/59616
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://svn.apache.org/viewvc?view=revision&revision=1578610
http://svn.apache.org/viewvc?view=revision&revision=1578611
http://svn.apache.org/viewvc?view=revision&revision=1578637
http://svn.apache.org/viewvc?view=revision&revision=1578655
http://svn.apache.org/viewvc?view=revision&revision=1585853
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.novell.com/support/kb/doc.php?id=7010166
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67667
http://www.securitytracker.com/id/1030301
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3c53c4da7bcf300f519eaed5ad1751d24dd59f6b
https://github.com/apache/tomcat/commit/5c545da226b3c71ed9603c38ad2de88057778c1b
https://github.com/apache/tomcat/commit/913d94b289e056107e521dbab8e79cc72a62a331
https://github.com/apache/tomcat/commit/970c23bfd24dfa1dcb86ed917e6c8b47dcfb4433
https://github.com/apache/tomcat80/commit/65ed69d96a101dfa99eea2cfe17e9e87b310084c
https://github.com/apache/tomcat80/commit/f3f2979df693a9c84c6742fcb162f3671b0a50d3
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0096.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0096
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0096
|
| tomcat-el-2.2-api |
CVE-2014-0119 |
LOW |
7.0.42-4.el7 |
7.0.42-8.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/141
http://secunia.com/advisories/59732
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://svn.apache.org/viewvc?view=revision&revision=1588193
http://svn.apache.org/viewvc?view=revision&revision=1588199
http://svn.apache.org/viewvc?view=revision&revision=1589640
http://svn.apache.org/viewvc?view=revision&revision=1589837
http://svn.apache.org/viewvc?view=revision&revision=1589980
http://svn.apache.org/viewvc?view=revision&revision=1589983
http://svn.apache.org/viewvc?view=revision&revision=1589985
http://svn.apache.org/viewvc?view=revision&revision=1589990
http://svn.apache.org/viewvc?view=revision&revision=1589992
http://svn.apache.org/viewvc?view=revision&revision=1589997
http://svn.apache.org/viewvc?view=revision&revision=1590028
http://svn.apache.org/viewvc?view=revision&revision=1590036
http://svn.apache.org/viewvc?view=revision&revision=1593815
http://svn.apache.org/viewvc?view=revision&revision=1593821
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67669
http://www.securitytracker.com/id/1030298
http://www.ubuntu.com/usn/USN-2654-1
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/080878ea519d8c74c53721a9ebf7be6fcf6f1f2f
https://github.com/apache/tomcat/commit/50311bed8d87e452ff0e69838ba312c4fe899b2d
https://github.com/apache/tomcat/commit/5517c5517e8a7ddb994504f0c5c05001a376b10c
https://github.com/apache/tomcat/commit/5aae1323c31d643afa9f2db80713b8e97b5123af
https://github.com/apache/tomcat/commit/6246d8307fb5f2b4ff0b0f4d6d1b0250dff01a81
https://github.com/apache/tomcat/commit/769477b9bc8442db3f571385fa0c3e206242cbf1
https://github.com/apache/tomcat/commit/934f884f330dad192d2c5dc950e28f4cd281461b
https://github.com/apache/tomcat/commit/ad3b34a290a0255d2a4c356a3611ab41ed9d04f5
https://github.com/apache/tomcat/commit/ce70ee6b8fe437a498a375215011056702b0c481
https://github.com/apache/tomcat/commit/ebe5c16f18ce1559e8462a94b3876a98525980d2
https://github.com/apache/tomcat/commit/f8b316acbbf9fabf87cc137e9777e912eda0d834
https://github.com/apache/tomcat80/commit/25251de791a6a7be13f2f3d3a66119a77025272d
https://github.com/apache/tomcat80/commit/4d90e355dc5ced4c53585c2b4700f71a52d8f447
https://github.com/apache/tomcat80/commit/51e59532ad4c604f55575963dc7a7f0250cb420f
https://github.com/apache/tomcat80/commit/69a8a72283c3395ece8b899cf8562e126de97a27
https://github.com/apache/tomcat80/commit/77e014cef5d5af619bcf77eaebf22c284d420802
https://github.com/apache/tomcat80/commit/7d33457de5fc5a652a88fb9bbc9ba4cbbda58f04
https://github.com/apache/tomcat80/commit/d59fd4398c8ae6361e0b13c491f66b51e49a7441
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0119.html
https://linux.oracle.com/errata/ELSA-2014-1038.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0119
https://ubuntu.com/security/notices/USN-2654-1
https://www.cve.org/CVERecord?id=CVE-2014-0119
|
| tomcat-el-2.2-api |
CVE-2014-0230 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://mail-archives.apache.org/mod_mbox/tomcat-announce/201505.mbox/%3C554949D1.8030904%40apache.org%3E
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://openwall.com/lists/oss-security/2015/04/10/1
http://rhn.redhat.com/errata/RHSA-2015-1621.html
http://rhn.redhat.com/errata/RHSA-2015-1622.html
http://rhn.redhat.com/errata/RHSA-2015-2661.html
http://rhn.redhat.com/errata/RHSA-2016-0595.html
http://rhn.redhat.com/errata/RHSA-2016-0596.html
http://rhn.redhat.com/errata/RHSA-2016-0597.html
http://rhn.redhat.com/errata/RHSA-2016-0598.html
http://rhn.redhat.com/errata/RHSA-2016-0599.html
http://svn.apache.org/viewvc?view=revision&revision=1603770
http://svn.apache.org/viewvc?view=revision&revision=1603775
http://svn.apache.org/viewvc?view=revision&revision=1603779
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.44
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.9
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/74475
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/errata/RHSA-2015:2659
https://access.redhat.com/errata/RHSA-2015:2660
https://access.redhat.com/security/cve/CVE-2014-0230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0230
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6b2cfacf749be186ea77249a979af1d4863e47ba
https://github.com/apache/tomcat/commit/812088583d0e60717a8fe9c6d14e12bcdc3e6c51
https://github.com/apache/tomcat/commit/b1c8477e3e3ee635d19cc4d5987c2b157431e0c1
https://github.com/apache/tomcat/commit/c1357e649641844109711d60cacb98e4b5fcd3cb
https://github.com/apache/tomcat/commit/e28dd578fad90a6d5726ec34f3245c9f99d909a5
https://github.com/apache/tomcat/commit/e3146f4b03a2386c3e57597e86134d4ed5c31303
https://github.com/apache/tomcat/commit/fc049912464f0dcf9dede3761f38049369057e16
https://github.com/apache/tomcat/commit/fdd9f11dc24b95e5425076abb58e968336f320a2
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://issues.jboss.org/browse/JWS-219
https://issues.jboss.org/browse/JWS-220
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0230
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-0230
|
| tomcat-el-2.2-api |
CVE-2015-5174 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://packetstormsecurity.com/files/135883/Apache-Tomcat-Limited-Directory-Traversal.html
http://rhn.redhat.com/errata/RHSA-2016-1435.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://seclists.org/bugtraq/2016/Feb/149
http://svn.apache.org/viewvc?view=revision&revision=1696281
http://svn.apache.org/viewvc?view=revision&revision=1696284
http://svn.apache.org/viewvc?view=revision&revision=1700897
http://svn.apache.org/viewvc?view=revision&revision=1700898
http://svn.apache.org/viewvc?view=revision&revision=1700900
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83329
http://www.securitytracker.com/id/1035070
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1432
https://access.redhat.com/errata/RHSA-2016:1433
https://access.redhat.com/errata/RHSA-2016:1434
https://access.redhat.com/security/cve/CVE-2015-5174
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5174.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r0b24f2c7507f702348e2c2d64e8a5de72bad6173658e8d8e45322ac2%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r0b24f2c7507f702348e2c2d64e8a5de72bad6173658e8d8e45322ac2@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd4863c79bf729aabb95571fd845a9ea4ee3ae3fcee48f35aba007350%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd4863c79bf729aabb95571fd845a9ea4ee3ae3fcee48f35aba007350@%3Cusers.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5174
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://www.cve.org/CVERecord?id=CVE-2015-5174
|
| tomcat-el-2.2-api |
CVE-2015-5345 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://packetstormsecurity.com/files/135892/Apache-Tomcat-Directory-Disclosure.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://seclists.org/bugtraq/2016/Feb/146
http://seclists.org/fulldisclosure/2016/Feb/122
http://svn.apache.org/viewvc?view=revision&revision=1715206
http://svn.apache.org/viewvc?view=revision&revision=1715207
http://svn.apache.org/viewvc?view=revision&revision=1715213
http://svn.apache.org/viewvc?view=revision&revision=1715216
http://svn.apache.org/viewvc?view=revision&revision=1716882
http://svn.apache.org/viewvc?view=revision&revision=1716894
http://svn.apache.org/viewvc?view=revision&revision=1717209
http://svn.apache.org/viewvc?view=revision&revision=1717212
http://svn.apache.org/viewvc?view=revision&revision=1717216
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.qcsec.com/blog/CVE-2015-5345-apache-tomcat-vulnerability.html
http://www.securityfocus.com/bid/83328
http://www.securitytracker.com/id/1035071
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5345
https://bto.bluecoat.com/security-advisory/sa118
https://bz.apache.org/bugzilla/show_bug.cgi?id=58765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/127d8ea86d245846f0472865f0eb1eb111955e71
https://github.com/apache/tomcat/commit/58c09b6217c546e1a251a82da227018f05277228
https://github.com/apache/tomcat/commit/66daa4adc14b3e939659879153c0a579fdfcb099
https://github.com/apache/tomcat/commit/7288bc70a14edcfeff0a96e333a858be374cfc64
https://github.com/apache/tomcat/commit/816552abf6735fa37dfd37c8a7bfbdbd045477e0
https://github.com/apache/tomcat/commit/8437193708e4bf6b2861a7953dc472f9dad49111
https://github.com/apache/tomcat/commit/89cd0cf33a99dbbcf5c69050a83b6876e39269d7
https://github.com/apache/tomcat/commit/a273b5f45cb46a273d06510a689fc314155a952d
https://github.com/apache/tomcat/commit/c584c7c4ab0686e4125eefcd0afb32fb8269da3d
https://github.com/apache/tomcat80/commit/2b643a4e36d318d55ec57fee57610671656d23c0
https://github.com/apache/tomcat80/commit/c15c2aba8eb42425f9ebcfcaef579dada38ad3a2
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://kc.mcafee.com/corporate/index?page=content&id=SB10156
https://linux.oracle.com/cve/CVE-2015-5345.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5345
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321235514/http://www.securitytracker.com/id/1035071
https://web.archive.org/web/20160804024910/http://www.securityfocus.com/bid/83328
https://www.cve.org/CVERecord?id=CVE-2015-5345
|
| tomcat-el-2.2-api |
CVE-2015-5346 |
LOW |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://packetstormsecurity.com/files/135890/Apache-Tomcat-Session-Fixation.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/143
http://svn.apache.org/viewvc?view=revision&revision=1713184
http://svn.apache.org/viewvc?view=revision&revision=1713185
http://svn.apache.org/viewvc?view=revision&revision=1713187
http://svn.apache.org/viewvc?view=revision&revision=1723414
http://svn.apache.org/viewvc?view=revision&revision=1723506
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83323
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5346
https://bto.bluecoat.com/security-advisory/sa118
https://bz.apache.org/bugzilla/show_bug.cgi?id=58809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/04164c1f01b973e548d95511d417f414ca723cb8
https://github.com/apache/tomcat/commit/6287be37d8d06c320215c45f7e2b8380411692e0
https://github.com/apache/tomcat/commit/83679b99cd40caa401d173c8f8e72fc98eb5d5be
https://github.com/apache/tomcat80/commit/41fbee7ba15435a831f765597ff907c56ebf2169
https://github.com/apache/tomcat80/commit/c39b7ffc2145644f7f3cf9e3cd4aada5048e56a0
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5346.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5346
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20160912063818/http://www.securityfocus.com/bid/83323
https://www.cve.org/CVERecord?id=CVE-2015-5346
|
| tomcat-el-2.2-api |
CVE-2016-0706 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/144
http://svn.apache.org/viewvc?view=revision&revision=1722799
http://svn.apache.org/viewvc?view=revision&revision=1722800
http://svn.apache.org/viewvc?view=revision&revision=1722801
http://svn.apache.org/viewvc?view=revision&revision=1722802
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83324
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0706
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706
https://github.com/apache/tomcat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2016-0706.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0706
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160226210040/http://www.securityfocus.com/bid/83324
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://www.cve.org/CVERecord?id=CVE-2016-0706
|
| tomcat-el-2.2-api |
CVE-2016-0762 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/pzuk6hauzljnm4r7?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93939
http://www.securitytracker.com/id/1037144
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-0762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0762
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/86b2e436099cb48f30dad950175c5beeeb763756
https://github.com/apache/tomcat/commit/970e615c7ade6ec6c341470bbc76aa1256353737
https://github.com/apache/tomcat/commit/d79c63d424fe6b225678416343b9ce106dec947c
https://github.com/apache/tomcat80/commit/dc4c3317452f0bc2c5e1f6a08d3bd9f22488b450
https://linux.oracle.com/cve/CVE-2016-0762.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/1872f96bad43647832bdd84a408794cd06d9cbb557af63085ca10009%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1872f96bad43647832bdd84a408794cd06d9cbb557af63085ca10009@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0762
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://www.cve.org/CVERecord?id=CVE-2016-0762
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-el-2.2-api |
CVE-2016-5018 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/lixw6iyojoxwfizv?q=list:org.apache.tomcat.announce/
http://packetstormsecurity.com/files/155873/Tomcat-9.0.0.M1-Sandbox-Escape.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-1551.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93942
http://www.securitytracker.com/id/1037142
http://www.securitytracker.com/id/1038757
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:1548
https://access.redhat.com/errata/RHSA-2017:1549
https://access.redhat.com/errata/RHSA-2017:1550
https://access.redhat.com/errata/RHSA-2017:1552
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-5018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5018
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/648122fef84d3b43223e0b5ae668f84719dada0a
https://github.com/apache/tomcat/commit/890a2f681ed2f3461b27983d7da9737375ff2ae4
https://github.com/apache/tomcat/commit/a6b1ebc246b91b854237e5aad3dfd2b5460ea282
https://linux.oracle.com/cve/CVE-2016-5018.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9b3a63a20c87179815fdea14f6766853bafe79a0042dc0b4aa878a9e%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9b3a63a20c87179815fdea14f6766853bafe79a0042dc0b4aa878a9e@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-5018
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161125134649/http://www.securityfocus.com/bid/93942
https://web.archive.org/web/20170908024318/http://www.securitytracker.com/id/1037142
https://web.archive.org/web/20171012232225/http://www.securitytracker.com/id/1038757
https://www.cve.org/CVERecord?id=CVE-2016-5018
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-el-2.2-api |
CVE-2016-6325 |
LOW |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93478
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/security/cve/CVE-2016-6325
https://bugzilla.redhat.com/show_bug.cgi?id=1367447
https://linux.oracle.com/cve/CVE-2016-6325.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6325
https://www.cve.org/CVERecord?id=CVE-2016-6325
|
| tomcat-el-2.2-api |
CVE-2016-6794 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/zk7w6yly5mviocci?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93943
http://www.securitytracker.com/id/1037143
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6794
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0b41766456b1980e4f809e13ad6dc9fa912bae7e
https://github.com/apache/tomcat/commit/c1660182010b4255c21c874d69c124370a67784a
https://github.com/apache/tomcat/commit/f8db078f1e6e8b225f8344e63595113ca34cd408
https://github.com/apache/tomcat80/commit/ae6163a4f230bc679abfc93e048ff92996badad6
https://linux.oracle.com/cve/CVE-2016-6794.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/09d2f2c65ac4ff5da42f15dc2b0f78b655e50f1a42e8a9784134a9eb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/09d2f2c65ac4ff5da42f15dc2b0f78b655e50f1a42e8a9784134a9eb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6794
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20170317100547/http://www.securitytracker.com/id/1037143
https://web.archive.org/web/20170626130744/http://www.securityfocus.com/bid/93943
https://www.cve.org/CVERecord?id=CVE-2016-6794
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-el-2.2-api |
CVE-2016-6796 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/hynaeawxxhpvvctu?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-1551.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93944
http://www.securitytracker.com/id/1037141
http://www.securitytracker.com/id/1038757
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:1548
https://access.redhat.com/errata/RHSA-2017:1549
https://access.redhat.com/errata/RHSA-2017:1550
https://access.redhat.com/errata/RHSA-2017:1552
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/f603f2f4595073f9490e01699d2083112a7c09a7
https://github.com/apache/tomcat/commit/f97769f50ee2613e1bf27107a01d48907fd993ac
https://github.com/apache/tomcat/commit/ffa0346fba2946401630291b642f1cff66d6a2be
https://github.com/apache/tomcat80/commit/d98fa92b9dfc90fe1ffdaa3cce1be3be84532260
https://linux.oracle.com/cve/CVE-2016-6796.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5a2105a56b2495ab70fa568f06925bd861f0d71ffab4fb38bb4fdc45%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5a2105a56b2495ab70fa568f06925bd861f0d71ffab4fb38bb4fdc45@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6796
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161029105733/http://www.securityfocus.com/bid/93944
https://web.archive.org/web/20161103080055/http://www.securitytracker.com/id/1037141
https://web.archive.org/web/20171012232225/http://www.securitytracker.com/id/1038757
https://www.cve.org/CVERecord?id=CVE-2016-6796
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-el-2.2-api |
CVE-2016-6797 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/wrku5orwxfpt5mzl?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93940
http://www.securitytracker.com/id/1037145
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2859ac3eae132383cb6f3f2042e25d7a4a281b0d
https://github.com/apache/tomcat/commit/b3406e6c318378cbf440f902f9fdbb8b440aef4e
https://github.com/apache/tomcat/commit/d6b5600afe75e1086dd564344e1d085966e4237d
https://github.com/apache/tomcat80/commit/824c7dc781056442046db0ae34bcf1497f23f44c
https://linux.oracle.com/cve/CVE-2016-6797.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9325837eb00cba5752c092047433c7f0415134d16e7f391447ff4352%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9325837eb00cba5752c092047433c7f0415134d16e7f391447ff4352@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6797
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20170320064509/http://www.securitytracker.com/id/1037145
https://web.archive.org/web/20170423095945/http://www.securityfocus.com/bid/93940
https://www.cve.org/CVERecord?id=CVE-2016-6797
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-el-2.2-api |
CVE-2018-8034 |
LOW |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283%40minotaur.apache.org%3E
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3E
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104895
http://www.securitytracker.com/id/1041374
https://access.redhat.com/errata/RHSA-2019:0130
https://access.redhat.com/errata/RHSA-2019:0131
https://access.redhat.com/errata/RHSA-2019:0450
https://access.redhat.com/errata/RHSA-2019:0451
https://access.redhat.com/errata/RHSA-2019:1159
https://access.redhat.com/errata/RHSA-2019:1160
https://access.redhat.com/errata/RHSA-2019:1161
https://access.redhat.com/errata/RHSA-2019:1162
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/errata/RHSA-2019:3892
https://access.redhat.com/security/cve/CVE-2018-8034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8034
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2835bb4e030c1c741ed0847bb3b9c3822e4fbc8a
https://github.com/apache/tomcat/commit/2c522795166c930741a9cecca76797bf48cb1634
https://linux.oracle.com/cve/CVE-2018-8034.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2018-8034
https://security.netapp.com/advisory/ntap-20180817-0001
https://security.netapp.com/advisory/ntap-20180817-0001/
https://ubuntu.com/security/notices/USN-3723-1
https://usn.ubuntu.com/3723-1
https://usn.ubuntu.com/3723-1/
https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104895
https://web.archive.org/web/20200517032514/http://www.securitytracker.com/id/1041374
https://www.cve.org/CVERecord?id=CVE-2018-8034
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat-el-2.2-api |
CVE-2019-0221 |
LOW |
7.0.42-4.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html
http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2019/May/50
http://www.securityfocus.com/bid/108545
https://access.redhat.com/errata/RHSA-2019:3929
https://access.redhat.com/errata/RHSA-2019:3931
https://access.redhat.com/security/cve/CVE-2019-0221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0221
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/15fcd166ea2c1bb79e8541b8e1a43da9c452ceea
https://github.com/apache/tomcat/commit/44ec74c44dcd05cd7e90967c04d40b51440ecd7e
https://github.com/apache/tomcat/commit/4fcdf706f3ecf35912a600242f89637f5acb32da
https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46
https://mail-archives.apache.org/mod_mbox/www-announce/201905.mbox/%3Cb1905aa6-f340-8d0b-58c4-8ac3ebcbfa54@apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-0221
https://seclists.org/bugtraq/2019/Dec/43
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20190606-0001
https://security.netapp.com/advisory/ntap-20190606-0001/
https://support.f5.com/csp/article/K13184144?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K13184144?utm_source=f5support&utm_medium=RSS
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4128-1
https://ubuntu.com/security/notices/USN-4128-2
https://usn.ubuntu.com/4128-1
https://usn.ubuntu.com/4128-1/
https://usn.ubuntu.com/4128-2
https://usn.ubuntu.com/4128-2/
https://web.archive.org/web/20200227055048/http://www.securityfocus.com/bid/108545
https://www.cve.org/CVERecord?id=CVE-2019-0221
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221
https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/
|
| tomcat-el-2.2-api |
CVE-2019-17563 |
LOW |
7.0.42-4.el7 |
7.0.76-15.el7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html
http://mail-archives.apache.org/mod_mbox/www-announce/201912.mbox/%3C21b7a375-7297-581b-1f8e-06622d36775b@apache.org%3E
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.30
https://access.redhat.com/security/cve/CVE-2019-17563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17563
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2019-17563.html
https://linux.oracle.com/errata/ELSA-2020-4004.html
https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e%40%3Cissues.cxf.apache.org%3E
https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17563
https://seclists.org/bugtraq/2019/Dec/43
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20200107-0001
https://security.netapp.com/advisory/ntap-20200107-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.99
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.50
https://ubuntu.com/security/notices/USN-4251-1
https://usn.ubuntu.com/4251-1
https://usn.ubuntu.com/4251-1/
https://www.cve.org/CVERecord?id=CVE-2019-17563
https://www.debian.org/security/2019/dsa-4596
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
|
| tomcat-el-2.2-api |
CVE-2020-1935 |
LOW |
7.0.42-4.el7 |
7.0.76-16.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
https://access.redhat.com/security/cve/CVE-2020-1935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1935
https://linux.oracle.com/cve/CVE-2020-1935.html
https://linux.oracle.com/errata/ELSA-2020-5020.html
https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1935
https://security.netapp.com/advisory/ntap-20200327-0005
https://security.netapp.com/advisory/ntap-20200327-0005/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31
https://ubuntu.com/security/notices/USN-4448-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://www.cve.org/CVERecord?id=CVE-2020-1935
https://www.debian.org/security/2020/dsa-4673
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| tomcat-el-2.2-api |
CVE-2021-25329 |
LOW |
7.0.42-4.el7 |
|
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3C811bba77-e74e-9f9b-62ca-5253a09ba84f%40apache.org%3E
http://www.openwall.com/lists/oss-security/2021/03/01/2
https://access.redhat.com/security/cve/CVE-2021-25329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25329
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2021-25329
https://security.gentoo.org/glsa/202208-34
https://security.netapp.com/advisory/ntap-20210409-0002
https://security.netapp.com/advisory/ntap-20210409-0002/
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.108
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43
https://ubuntu.com/security/notices/USN-5360-1
https://www.cve.org/CVERecord?id=CVE-2021-25329
https://www.debian.org/security/2021/dsa-4891
https://www.openwall.com/lists/oss-security/2021/03/01/2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-el-2.2-api |
CVE-2022-29885 |
LOW |
7.0.42-4.el7 |
|
http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2022-29885
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0fa7721f11d565a2cd2e44366c388ad6a3e6357d
https://github.com/apache/tomcat/commit/36826ea638457d7e17876a70f89cb435b6db0d91
https://github.com/apache/tomcat/commit/b679bc627f5a4ea6510af95adfb7476b07eba890
https://github.com/apache/tomcat/commit/eaafd28296c54d983e28a47953c1f5cb2c334f48
https://lists.apache.org/thread/2b4qmhbcyqvc7dyfpjyx54c03x65vhcv
https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29885
https://security.netapp.com/advisory/ntap-20220629-0002
https://security.netapp.com/advisory/ntap-20220629-0002/
https://www.cve.org/CVERecord?id=CVE-2022-29885
https://www.debian.org/security/2022/dsa-5265
https://www.oracle.com/security-alerts/cpujul2022.html
|
| tomcat-el-2.2-api |
CVE-2022-4132 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-4132
https://bugzilla.redhat.com/show_bug.cgi?id=2147372
https://nvd.nist.gov/vuln/detail/CVE-2022-4132
https://www.cve.org/CVERecord?id=CVE-2022-4132
|
| tomcat-el-2.2-api |
CVE-2022-42252 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-42252
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0d089a15047faf9cb3c82f80f4d28febd4798920
https://github.com/apache/tomcat/commit/4c7f4fd09d2cc1692112ef70b8ee23a7a037ae77
https://github.com/apache/tomcat/commit/a1c07906d8dcaf7957e5cc97f5cdbac7d18a205a
https://github.com/apache/tomcat/commit/c9fe754e5d17e262dfbd3eab2a03ca96ff372dc3
https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq
https://nvd.nist.gov/vuln/detail/CVE-2022-42252
https://security.gentoo.org/glsa/202305-37
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2022-42252
|
| tomcat-el-2.2-api |
CVE-2022-45143 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-45143
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0cab3a56bd89f70e7481bb0d68395dc7e130dbbf
https://github.com/apache/tomcat/commit/6a0ac6a438cbbb66b6e9c5223842f53bf0cb50aa
https://github.com/apache/tomcat/commit/b336f4e58893ea35114f1e4a415657f723b1298e
https://lists.apache.org/thread/yqkd183xrw3wqvnpcg3osbcryq85fkzj
https://nvd.nist.gov/vuln/detail/CVE-2022-45143
https://security.gentoo.org/glsa/202305-37
https://www.cve.org/CVERecord?id=CVE-2022-45143
|
| tomcat-jsp-2.2-api |
CVE-2014-0186 |
HIGH |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://www.osvdb.org/108060
https://access.redhat.com/security/cve/CVE-2014-0186
https://bugzilla.redhat.com/show_bug.cgi?id=1089884
https://linux.oracle.com/cve/CVE-2014-0186.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://nvd.nist.gov/vuln/detail/CVE-2014-0186
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://security-tracker.debian.org/tracker/CVE-2014-0186
https://www.cve.org/CVERecord?id=CVE-2014-0186
|
| tomcat-jsp-2.2-api |
CVE-2016-5425 |
HIGH |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
http://legalhackers.com/advisories/Tomcat-RedHat-based-Root-Privilege-Escalation-Exploit.txt
http://packetstormsecurity.com/files/139041/Apache-Tomcat-8-7-6-Privilege-Escalation.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://www.openwall.com/lists/oss-security/2016/10/10/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93472
http://www.securitytracker.com/id/1036979
https://access.redhat.com/security/cve/CVE-2016-5425
https://linux.oracle.com/cve/CVE-2016-5425.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d%40%3Cissues.activemq.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-5425
https://www.cve.org/CVERecord?id=CVE-2016-5425
https://www.exploit-db.com/exploits/40488/
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat-jsp-2.2-api |
CVE-2016-8745 |
HIGH |
7.0.42-4.el7 |
7.0.69-11.el7_3 |
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-0527.html
http://www.debian.org/security/2017/dsa-3754
http://www.debian.org/security/2017/dsa-3755
http://www.openwall.com/lists/oss-security/2016/12/12/1
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/94828
http://www.securitytracker.com/id/1037432
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:0935
https://access.redhat.com/security/cve/CVE-2016-8745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/143bb466cf96a89e791b7db5626055ea819dad89
https://github.com/apache/tomcat/commit/16a57bc885e212839f1d717b94b01d154a36943a
https://github.com/apache/tomcat/commit/cbc9b18a845d3c8c053ac293dffda6c6c19dd92b
https://github.com/apache/tomcat80/commit/3dd2fec73e0de1edc1d3eb1c52a01255fdfc84e7
https://linux.oracle.com/cve/CVE-2016-8745.html
https://linux.oracle.com/errata/ELSA-2017-0935.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/4113c05d37f37c12b8033205684f04033c5f7a9bae117d4af23b32b4%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/4113c05d37f37c12b8033205684f04033c5f7a9bae117d4af23b32b4@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8745
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180607-0002
https://security.netapp.com/advisory/ntap-20180607-0002/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9
https://ubuntu.com/security/notices/USN-3177-1
https://web.archive.org/web/20200227165932/http://www.securityfocus.com/bid/94828
https://web.archive.org/web/20200517114357/http://www.securitytracker.com/id/1037432
https://www.cve.org/CVERecord?id=CVE-2016-8745
|
| tomcat-jsp-2.2-api |
CVE-2017-12615 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html
http://www.securityfocus.com/bid/100901
http://www.securitytracker.com/id/1039392
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/security/cve/CVE-2017-12615
https://github.com/advisories/GHSA-pjfr-qf3p-3q25
https://github.com/breaktoprotect/CVE-2017-12615
https://linux.oracle.com/cve/CVE-2017-12615.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-12615
https://security.netapp.com/advisory/ntap-20171018-0001
https://security.netapp.com/advisory/ntap-20171018-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
https://www.cve.org/CVERecord?id=CVE-2017-12615
https://www.exploit-db.com/exploits/42953
https://www.exploit-db.com/exploits/42953/
https://www.synology.com/support/security/Synology_SA_17_54_Tomcat
|
| tomcat-jsp-2.2-api |
CVE-2017-12617 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/100954
http://www.securitytracker.com/id/1039552
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2018:0268
https://access.redhat.com/errata/RHSA-2018:0269
https://access.redhat.com/errata/RHSA-2018:0270
https://access.redhat.com/errata/RHSA-2018:0271
https://access.redhat.com/errata/RHSA-2018:0275
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/security/cve/CVE-2017-12617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12617
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/24aea94807f940ee44aa550378dc903289039ddd
https://github.com/apache/tomcat/commit/31e99502e2c602449a2f8835bd23ade772b77333
https://github.com/apache/tomcat/commit/327e8a6644e188764325a013aa2725a60f1b37e5
https://github.com/apache/tomcat/commit/46dfedbc0523d7182be97f4244d7b6c942164485
https://github.com/apache/tomcat/commit/4cf7dab88282c8f3c92f0b961cdb0096e1d63e88
https://github.com/apache/tomcat/commit/506d862e7edfa991de198e0f2e4c4540830fa531
https://github.com/apache/tomcat/commit/512a3c3aecdb52de092c6bacddd71b85c4feda06
https://github.com/apache/tomcat/commit/74ad0e216c791454a318c1811300469eedc5c6f3
https://github.com/apache/tomcat/commit/a9dd96046d7acb0357c6b7b9e6cc70d186fae663
https://github.com/apache/tomcat/commit/b577f9a7996b92b650b1649af3c3bae11c120db9
https://github.com/apache/tomcat/commit/b7e0435d17aba69f16ae9e8a78ad0f1565b552af
https://github.com/apache/tomcat/commit/bbcbb749c75056a2781f37038d63e646fe972104
https://github.com/apache/tomcat/commit/c177e9668d1278710bdb14c0eb8d2702b3655f5a
https://github.com/apache/tomcat/commit/cf0b37beb0622abdf24acc7110daf883f3fe4f95
https://github.com/apache/tomcat/commit/d5b170705d24c386d76038e5989045c89795c28c
https://github.com/apache/tomcat/commit/e650cf1b83e441dbd3863f3f6b61c972cafce19e
https://github.com/apache/tomcat/commit/f1b85da754c4760787d68a99e839b50878140b57
https://github.com/apache/tomcat/commit/fd52f8601170b91f9d7162510e54563e5bf6bdfe
https://linux.oracle.com/cve/CVE-2017-12617.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2017-12617
https://security.netapp.com/advisory/ntap-20171018-0002
https://security.netapp.com/advisory/ntap-20171018-0002/
https://security.netapp.com/advisory/ntap-20180117-0002
https://security.netapp.com/advisory/ntap-20180117-0002/
https://support.f5.com/csp/article/K53173544
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03812en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20171110171954/http://www.securityfocus.com/bid/100954
https://web.archive.org/web/20201209024734/http://www.securitytracker.com/id/1039552
https://www.alphabot.com/security/blog/2017/java/Apache-Tomcat-RCE-CVE-2017-12617.html
https://www.cve.org/CVERecord?id=CVE-2017-12617
https://www.exploit-db.com/exploits/42966
https://www.exploit-db.com/exploits/42966/
https://www.exploit-db.com/exploits/43008
https://www.exploit-db.com/exploits/43008/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| tomcat-jsp-2.2-api |
CVE-2017-5647 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.arubanetworks.com/assets/alert/HPESBHF03730.txt
http://www.debian.org/security/2017/dsa-3842
http://www.debian.org/security/2017/dsa-3843
http://www.openwall.com/lists/oss-security/2017/04/10/24
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.securitytracker.com/id/1038218
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/security/cve/CVE-2017-5647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/864aa1199ad2cccc9a7e7c6b977f7d7f812c9910
https://github.com/apache/tomcat/commit/a4efd3ca1ccbdfc398136d76c0d8b7ad5a1e4905
https://github.com/apache/tomcat/commit/f5e06b8c743b1daa9eb5e817863958b6b320e044
https://github.com/apache/tomcat80/commit/ec10b8c785d1db91fe58946436f854dde04410fd
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03730en_us
https://linux.oracle.com/cve/CVE-2017-5647.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5796678c5a773c6f3ff57c178ac247d85ceca0dee9190ba48171451a%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5796678c5a773c6f3ff57c178ac247d85ceca0dee9190ba48171451a@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5647
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180614-0001
https://security.netapp.com/advisory/ntap-20180614-0001/
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170420114447/http://www.securitytracker.com/id/1038218
https://www.cve.org/CVERecord?id=CVE-2017-5647
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-jsp-2.2-api |
CVE-2017-5664 |
HIGH |
7.0.42-4.el7 |
7.0.69-12.el7_3 |
http://apt.inguza.net/wheezy-security/tomcat/tomcat8-CVE-2017-5664.patch
http://www.debian.org/security/2017/dsa-3891
http://www.debian.org/security/2017/dsa-3892
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/98888
http://www.securitytracker.com/id/1038641
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:1809
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/errata/RHSA-2017:2633
https://access.redhat.com/errata/RHSA-2017:2635
https://access.redhat.com/errata/RHSA-2017:2636
https://access.redhat.com/errata/RHSA-2017:2637
https://access.redhat.com/errata/RHSA-2017:2638
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/security/cve/CVE-2017-5664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/29893e66111d33cfe99dd01cb146317c0c262ef4
https://github.com/apache/tomcat/commit/3242efea525df01d15da6e90ea69a9a21b10b454
https://github.com/apache/tomcat/commit/3bfe9fb886598c4d8ecbe674216152006bbce456
https://github.com/apache/tomcat/commit/4545dcce444aa619374a659cb450dbbd0be3c921
https://github.com/apache/tomcat/commit/58b32048ce25cb812ae394dafb0cd57254c68155
https://github.com/apache/tomcat/commit/7d93527254d9e9371b342800617f20d13c8b85ad
https://github.com/apache/tomcat80/commit/25d3c0d93190ef165ecd6c744bc15b5059abfa8f
https://github.com/apache/tomcat80/commit/e070a31ec81b56377822e44883c64abb41f36a3b
https://linux.oracle.com/cve/CVE-2017-5664.html
https://linux.oracle.com/errata/ELSA-2017-3080.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5664
https://security.netapp.com/advisory/ntap-20171019-0002
https://security.netapp.com/advisory/ntap-20171019-0002/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.78
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.44
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.15
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170801120345/http://www.securitytracker.com/id/1038641
https://web.archive.org/web/20170805032345/http://www.securityfocus.com/bid/98888
https://www.cve.org/CVERecord?id=CVE-2017-5664
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-jsp-2.2-api |
CVE-2018-1336 |
HIGH |
7.0.42-4.el7 |
7.0.76-8.el7_5 |
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090435.GA60759%40minotaur.apache.org%3E
http://www.securityfocus.com/bid/104898
http://www.securitytracker.com/id/1041375
https://access.redhat.com/errata/RHEA-2018:2188
https://access.redhat.com/errata/RHEA-2018:2189
https://access.redhat.com/errata/RHSA-2018:2700
https://access.redhat.com/errata/RHSA-2018:2701
https://access.redhat.com/errata/RHSA-2018:2740
https://access.redhat.com/errata/RHSA-2018:2741
https://access.redhat.com/errata/RHSA-2018:2742
https://access.redhat.com/errata/RHSA-2018:2743
https://access.redhat.com/errata/RHSA-2018:2921
https://access.redhat.com/errata/RHSA-2018:2930
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2018:2945
https://access.redhat.com/errata/RHSA-2018:3768
https://access.redhat.com/security/cve/CVE-2018-1336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1336
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/156d76a6afeef440d14044a560d6ad1d029361c4
https://github.com/apache/tomcat/commit/92cd494555598e99dd691712e8ee426a2f9c2e93
https://github.com/apache/tomcat/commit/e00812b94e5830b2be3de04f4ae4ade38a700074
https://github.com/apache/tomcat80/commit/9e9b7fe1b5732277a26e437f1d32155de6208ef2
https://linux.oracle.com/cve/CVE-2018-1336.html
https://linux.oracle.com/errata/ELSA-2018-2921.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1336
https://security.netapp.com/advisory/ntap-20180817-0001
https://security.netapp.com/advisory/ntap-20180817-0001/
https://support.f5.com/csp/article/K73008537?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K73008537?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3723-1
https://usn.ubuntu.com/3723-1
https://usn.ubuntu.com/3723-1/
https://web.archive.org/web/20190703075545/http://www.securitytracker.com/id/1041375
https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104898
https://www.cve.org/CVERecord?id=CVE-2018-1336
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| tomcat-jsp-2.2-api |
CVE-2020-13935 |
HIGH |
7.0.42-4.el7 |
7.0.76-15.el7 |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3C39e4200c-6f4e-b85d-fe4b-a9c2bd5fdc3d%40apache.org%3E
http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37
https://access.redhat.com/security/cve/CVE-2020-13935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/12d715676038efbf9c728af10163f8277fc019d5
https://github.com/apache/tomcat/commit/1c1c77b0efb667cea80b532440b44cea1dc427c3
https://github.com/apache/tomcat/commit/40fa74c74822711ab878079d0a69f7357926723d
https://github.com/apache/tomcat/commit/4c04982870d6e730c38e21e58fb653b7cf723784
https://github.com/apache/tomcat/commit/f9f75c14678b68633f79030ddf4ff827f014cc84
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-13935.html
https://linux.oracle.com/errata/ELSA-2020-4004.html
https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2020-13935
https://security.netapp.com/advisory/ntap-20200724-0003
https://security.netapp.com/advisory/ntap-20200724-0003/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4448-1
https://ubuntu.com/security/notices/USN-4596-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://usn.ubuntu.com/4596-1
https://usn.ubuntu.com/4596-1/
https://www.cve.org/CVERecord?id=CVE-2020-13935
https://www.debian.org/security/2020/dsa-4727
https://www.openwall.com/lists/oss-security/2020/07/14/3
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-jsp-2.2-api |
CVE-2020-1938 |
HIGH |
7.0.42-4.el7 |
7.0.76-11.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html
http://support.blackberry.com/kb/articleDetail?articleNumber=000062739
https://access.redhat.com/security/cve/CVE-2020-1938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1938
https://linux.oracle.com/cve/CVE-2020-1938.html
https://linux.oracle.com/errata/ELSA-2020-0912.html
https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a%40%3Cusers.tomee.apache.org%3E
https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a@%3Cusers.tomee.apache.org%3E
https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7%40%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E
https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3@%3Ccommits.tomee.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B
https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/
https://nvd.nist.gov/vuln/detail/CVE-2020-1938
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20200226-0002
https://security.netapp.com/advisory/ntap-20200226-0002/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31
https://www.cnvd.org.cn/webinfo/show/5415
https://www.cve.org/CVERecord?id=CVE-2020-1938
https://www.debian.org/security/2020/dsa-4673
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487
|
| tomcat-jsp-2.2-api |
CVE-2020-9484 |
HIGH |
7.0.42-4.el7 |
7.0.76-12.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202005.mbox/%3Ce3a0a517-bf82-ba62-0af6-24b83ea0e4e2%40apache.org%3E
http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html
http://seclists.org/fulldisclosure/2020/Jun/6
http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M5
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.104
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.55
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.35
http://www.openwall.com/lists/oss-security/2021/03/01/2
https://access.redhat.com/security/cve/CVE-2020-9484
https://bugzilla.suse.com/show_bug.cgi?id=1171928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222 (9.0.35)
https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222.patch
https://github.com/apache/tomcat/commit/4785433a226a20df6acbea49296e1ce7e23de453
https://github.com/apache/tomcat/commit/53e30390943c18fca0c9e57dbcc14f1c623cfd06 (7.0.104)
https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4
https://github.com/apache/tomcat/commit/74b105657ffbd1d1de80455f03446c3bbf30d1f5
https://github.com/apache/tomcat/commit/93f0cc403a9210d469afc2bd9cf03ab3251c6f35
https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b
https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b (10.0.0-M5)
https://github.com/apache/tomcat/commit/ec08af18d0f9ddca3f2d800ef66fe7fd20afef2f (8.5.55)
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-9484.html
https://linux.oracle.com/errata/ELSA-2020-2530.html
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/05/msg00020.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N
https://nvd.nist.gov/vuln/detail/CVE-2020-9484
https://security.gentoo.org/glsa/202006-21
https://security.netapp.com/advisory/ntap-20200528-0005
https://security.netapp.com/advisory/ntap-20200528-0005/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4448-1
https://ubuntu.com/security/notices/USN-4596-1
https://ubuntu.com/security/notices/USN-5360-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://usn.ubuntu.com/4596-1
https://usn.ubuntu.com/4596-1/
https://www.cve.org/CVERecord?id=CVE-2020-9484
https://www.debian.org/security/2020/dsa-4727
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-jsp-2.2-api |
CVE-2023-34981 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-34981
https://bz.apache.org/bugzilla/show_bug.cgi?id=66512
https://bz.apache.org/bugzilla/show_bug.cgi?id=66591
https://github.com/advisories/GHSA-mppv-79ch-vw6q
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2214c8030522aa9b2a367dfa5d9acff1a03666ae
https://github.com/apache/tomcat/commit/2f0ca2378415f4cf0748f4bc8fa955f41f803fa5
https://github.com/apache/tomcat/commit/739c7381aed22b7636351caf885ddc519ab6b442
https://github.com/apache/tomcat/commit/f0742f47b98aca943097f7f88e0d1163f57527e3
https://lists.apache.org/thread/j1ksjh9m9gx1q60rtk1sbzmxhvj5h5qz
https://nvd.nist.gov/vuln/detail/CVE-2023-34981
https://security.netapp.com/advisory/ntap-20230714-0003
https://security.netapp.com/advisory/ntap-20230714-0003/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-34981
|
| tomcat-jsp-2.2-api |
CVE-2023-46589 |
HIGH |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/11/28/2
https://access.redhat.com/errata/RHSA-2024:1134
https://access.redhat.com/security/cve/CVE-2023-46589
https://bugzilla.redhat.com/2252050
https://bugzilla.redhat.com/show_bug.cgi?id=2252050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46589
https://errata.almalinux.org/9/ALSA-2024-1134.html
https://errata.rockylinux.org/RLSA-2024:0539
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6f181e1062a472bc5f0234980f66cbde42c1041b
https://github.com/apache/tomcat/commit/7a2d8818fcea0b51747a67af9510ce7977245ebd
https://github.com/apache/tomcat/commit/aa92971e879a519384c517febc39fd04c48d4642
https://github.com/apache/tomcat/commit/b5776d769bffeade865061bc8ecbeb2b56167b08
https://linux.oracle.com/cve/CVE-2023-46589.html
https://linux.oracle.com/errata/ELSA-2024-1134.html
https://lists.apache.org/thread/0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr
https://lists.debian.org/debian-lts-announce/2024/01/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2023-46589
https://security.netapp.com/advisory/ntap-20231214-0009
https://security.netapp.com/advisory/ntap-20231214-0009/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-46589
https://www.openwall.com/lists/oss-security/2023/11/28/2
|
| tomcat-jsp-2.2-api |
CVE-2024-23672 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-23672
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0052b374684b613b0c849899b325ebe334ac6501
https://github.com/apache/tomcat/commit/3631adb1342d8bbd8598802a12b63ad02c37d591
https://github.com/apache/tomcat/commit/52d6650e062d880704898d7d8c1b2b7a3efe8068
https://github.com/apache/tomcat/commit/b0e3b1bd78de270d53e319d7cb79eb282aa53cb9
https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f
https://nvd.nist.gov/vuln/detail/CVE-2024-23672
https://www.cve.org/CVERecord?id=CVE-2024-23672
|
| tomcat-jsp-2.2-api |
CVE-2024-24549 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-24549
https://lists.apache.org/thread/4c50rmomhbbsdgfjsgwlb51xdwfjdcvg
https://nvd.nist.gov/vuln/detail/CVE-2024-24549
https://www.cve.org/CVERecord?id=CVE-2024-24549
|
| tomcat-jsp-2.2-api |
CVE-2013-4286 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://advisories.mageia.org/MGASA-2014-0148.html
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2014-0343.html
http://rhn.redhat.com/errata/RHSA-2014-0344.html
http://rhn.redhat.com/errata/RHSA-2014-0345.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/57675
http://secunia.com/advisories/59036
http://secunia.com/advisories/59675
http://secunia.com/advisories/59722
http://secunia.com/advisories/59724
http://secunia.com/advisories/59733
http://secunia.com/advisories/59873
http://svn.apache.org/viewvc?view=revision&revision=1521829
http://svn.apache.org/viewvc?view=revision&revision=1521854
http://svn.apache.org/viewvc?view=revision&revision=1552565
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21667883
http://www-01.ibm.com/support/docview.wss?uid=swg21675886
http://www-01.ibm.com/support/docview.wss?uid=swg21677147
http://www-01.ibm.com/support/docview.wss?uid=swg21678113
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65773
http://www.ubuntu.com/usn/USN-2130-1
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2013-4286
https://bugzilla.redhat.com/show_bug.cgi?id=1069921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/41b90b6ebc3e7f898a5a87d197ddf63790d33315
https://github.com/apache/tomcat/commit/7c040003f1387795356605566be7870cf70e05dc
https://github.com/apache/tomcat/commit/bcce3e4997a4ed06fe03e2517443f3ad8ade2dfa
https://github.com/apache/tomcat/commit/d0b3e252eb168fafbfb4c3efc16d4192fc8fad6c
https://github.com/apache/tomcat80/commit/ff00954b78e6484e40f323c0cef2e6d95c2882b9
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2013-4286.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-4286
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://ubuntu.com/security/notices/USN-2130-1
https://web.archive.org/web/20140724174205/http://secunia.com/advisories/57675
https://web.archive.org/web/20140804172142/http://secunia.com/advisories/59036
https://web.archive.org/web/20141230041748/http://seclists.org/fulldisclosure/2014/Dec/23
https://web.archive.org/web/20160317145515/http://www.securityfocus.com/archive/1/534161/100/0/threaded
https://web.archive.org/web/20160729061926/http://www.securityfocus.com/bid/65773
https://web.archive.org/web/20161014054543/http://www-01.ibm.com/support/docview.wss?uid=swg21678231
https://web.archive.org/web/20161014054838/http://www-01.ibm.com/support/docview.wss?uid=swg21677147
https://web.archive.org/web/20161014054913/http://www-01.ibm.com/support/docview.wss?uid=swg21678113
https://web.archive.org/web/20161014054948/http://www-01.ibm.com/support/docview.wss?uid=swg21667883
https://web.archive.org/web/20161024215453/http://secunia.com/advisories/59873
https://web.archive.org/web/20161024215639/http://secunia.com/advisories/59722
https://web.archive.org/web/20161024215804/http://secunia.com/advisories/59675
https://web.archive.org/web/20161024220018/http://secunia.com/advisories/59724
https://web.archive.org/web/20161024220034/http://secunia.com/advisories/59733
https://www.cve.org/CVERecord?id=CVE-2013-4286
|
| tomcat-jsp-2.2-api |
CVE-2013-4322 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://advisories.mageia.org/MGASA-2014-0148.html
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/59036
http://secunia.com/advisories/59675
http://secunia.com/advisories/59722
http://secunia.com/advisories/59724
http://secunia.com/advisories/59873
http://svn.apache.org/viewvc?view=revision&revision=1521834
http://svn.apache.org/viewvc?view=revision&revision=1521864
http://svn.apache.org/viewvc?view=revision&revision=1549522
http://svn.apache.org/viewvc?view=revision&revision=1549523
http://svn.apache.org/viewvc?view=revision&revision=1556540
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21667883
http://www-01.ibm.com/support/docview.wss?uid=swg21675886
http://www-01.ibm.com/support/docview.wss?uid=swg21677147
http://www-01.ibm.com/support/docview.wss?uid=swg21678113
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65767
http://www.ubuntu.com/usn/USN-2130-1
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2013-4322
https://bugzilla.redhat.com/show_bug.cgi?id=1069905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/70dc3b279f7c99136c2c51bce8812508b4893c8b
https://github.com/apache/tomcat/commit/72613a0e2f88af789c2acc7093c82ff02b95b6d1
https://github.com/apache/tomcat/commit/a91516b80deaf1d0c6e04a7931765fdac34c4ccd
https://github.com/apache/tomcat/commit/b8cb9f5f91e9210ca107fd80f3e6acd47531daa7
https://github.com/apache/tomcat/commit/bed3a1a0d06a3c787183c6e90f326bbe17e49dd4
https://github.com/apache/tomcat/commit/d6a9898125f34e593de426e8c7dabb0f224fc00f
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2013-4322.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-4322
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://ubuntu.com/security/notices/USN-2130-1
https://web.archive.org/web/20140315211337/http://www.securityfocus.com/bid/65767
https://web.archive.org/web/20150503090027/http://www.securityfocus.com/archive/1/534161/100/0/threaded
https://web.archive.org/web/20151023203543/http://secunia.com/advisories/59873
https://web.archive.org/web/20161024215620/http://secunia.com/advisories/59036
https://web.archive.org/web/20161024215639/http://secunia.com/advisories/59722
https://web.archive.org/web/20161024215804/http://secunia.com/advisories/59675
https://web.archive.org/web/20161024220018/http://secunia.com/advisories/59724
https://www.cve.org/CVERecord?id=CVE-2013-4322
|
| tomcat-jsp-2.2-api |
CVE-2014-0075 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/59121
http://secunia.com/advisories/59616
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://secunia.com/advisories/60793
http://svn.apache.org/viewvc?view=revision&revision=1578337
http://svn.apache.org/viewvc?view=revision&revision=1578341
http://svn.apache.org/viewvc?view=revision&revision=1579262
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21680603
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.novell.com/support/kb/doc.php?id=7010166
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67671
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/b6974571c122f6a1e7ec74a90fa212976fa7b0ed
https://github.com/apache/tomcat/commit/f646a5acd5e32d6f5a2d9bf1d94ca66b65477675
https://github.com/apache/tomcat80/commit/d49a03728ac7e3c800b1b0ce0eeccd8a5a21bb91
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0075.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0075
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0075
|
| tomcat-jsp-2.2-api |
CVE-2014-0099 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/138
http://seclists.org/fulldisclosure/2014/May/140
http://secunia.com/advisories/59121
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://secunia.com/advisories/60793
http://svn.apache.org/viewvc?view=revision&revision=1578812
http://svn.apache.org/viewvc?view=revision&revision=1578814
http://svn.apache.org/viewvc?view=revision&revision=1580473
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21680603
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.securityfocus.com/archive/1/532218/100/0/threaded
http://www.securityfocus.com/archive/1/532221/100/0/threaded
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67668
http://www.securitytracker.com/id/1030302
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/184cdc0d3f03f5737e12d21fff246d7285034597
https://github.com/apache/tomcat/commit/fffd63a3bd3a5475379b7c074820a5463b7663b3
https://github.com/apache/tomcat80/commit/990de53ab923c126f7402090a4ca53df4bb80cbd
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0099.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0099
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0099
|
| tomcat-jsp-2.2-api |
CVE-2014-0227 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-2.el7_1 |
http://advisories.mageia.org/MGASA-2015-0081.html
http://archives.neohapsis.com/archives/bugtraq/2015-02/0067.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=143393515412274&w=2
http://marc.info/?l=bugtraq&m=143403519711434&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://rhn.redhat.com/errata/RHSA-2015-0983.html
http://rhn.redhat.com/errata/RHSA-2015-0991.html
http://svn.apache.org/viewvc?view=revision&revision=1600984
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/72717
http://www.securitytracker.com/id/1032791
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/security/cve/CVE-2014-0227
https://bugzilla.redhat.com/show_bug.cgi?id=1109196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227
https://linux.oracle.com/cve/CVE-2014-0227.html
https://linux.oracle.com/errata/ELSA-2015-0991.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0227
https://source.jboss.org/changelog/JBossWeb?cs=2455
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.43
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-0227
|
| tomcat-jsp-2.2-api |
CVE-2014-7810 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2015-1621.html
http://rhn.redhat.com/errata/RHSA-2015-1622.html
http://rhn.redhat.com/errata/RHSA-2016-0492.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://svn.apache.org/viewvc?view=revision&revision=1644018
http://svn.apache.org/viewvc?view=revision&revision=1645642
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.44
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.59
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.17
http://www.debian.org/security/2015/dsa-3428
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/74665
http://www.securitytracker.com/id/1032330
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/security/cve/CVE-2014-7810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://linux.oracle.com/cve/CVE-2014-7810.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-7810
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-7810
|
| tomcat-jsp-2.2-api |
CVE-2015-5351 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://packetstormsecurity.com/files/135882/Apache-Tomcat-CSRF-Token-Leak.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/148
http://svn.apache.org/viewvc?view=revision&revision=1720652
http://svn.apache.org/viewvc?view=revision&revision=1720655
http://svn.apache.org/viewvc?view=revision&revision=1720658
http://svn.apache.org/viewvc?view=revision&revision=1720660
http://svn.apache.org/viewvc?view=revision&revision=1720661
http://svn.apache.org/viewvc?view=revision&revision=1720663
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/83330
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5351
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351
https://github.com/apache/tomcat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5351.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5351
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://softwaresupport.hpe.com/document/-/facetsearch/document/KM02978021
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20161020161943/http://www.securityfocus.com/bid/83330
https://www.cve.org/CVERecord?id=CVE-2015-5351
|
| tomcat-jsp-2.2-api |
CVE-2016-0714 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/145
http://svn.apache.org/viewvc?view=revision&revision=1725263
http://svn.apache.org/viewvc?view=revision&revision=1725914
http://svn.apache.org/viewvc?view=revision&revision=1726196
http://svn.apache.org/viewvc?view=revision&revision=1726203
http://svn.apache.org/viewvc?view=revision&revision=1726923
http://svn.apache.org/viewvc?view=revision&revision=1727034
http://svn.apache.org/viewvc?view=revision&revision=1727166
http://svn.apache.org/viewvc?view=revision&revision=1727182
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83327
http://www.securitytracker.com/id/1035069
http://www.securitytracker.com/id/1037640
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0714
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/50f1b1da794cd93b70ab5456d3c2c984408e1506
https://github.com/apache/tomcat/commit/79e8ad03404c131009811855f9a30d8d01c0c736
https://github.com/apache/tomcat/commit/824eb1d1ad922e7652ecf51adb2b9eebb5bb88b5
https://github.com/apache/tomcat/commit/e1b1002129fea4033329f6f619ba219527bbbd40
https://github.com/apache/tomcat/commit/f626da75fd59da82b14dee7b8cc46ad51eefdbe5
https://github.com/apache/tomcat/commit/ff1b659dc366a2ad47cd8f7e3544c796a1b15e46
https://github.com/apache/tomcat80/commit/2e5cc28052e84ba45196949ba602484221bbf33c
https://github.com/apache/tomcat80/commit/5430f30c79383e4d2d87785468905fcb00bace58
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2016-0714.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0714
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20170204045529/http://www.securityfocus.com/bid/83327
https://web.archive.org/web/20170601064840/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20170927131230/http://www.securitytracker.com/id/1037640
https://www.cve.org/CVERecord?id=CVE-2016-0714
|
| tomcat-jsp-2.2-api |
CVE-2016-0763 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179356.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/147
http://svn.apache.org/viewvc?view=revision&revision=1725926
http://svn.apache.org/viewvc?view=revision&revision=1725929
http://svn.apache.org/viewvc?view=revision&revision=1725931
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/83326
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0763
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/76ebc9007567c8326217dd94844540e1e27d8468
https://github.com/apache/tomcat/commit/c08641da04d31f730b56b8675301e55db97dfe88
https://github.com/apache/tomcat80/commit/0531f7aeff1999d362e0a68512a3517f2cf1a6ae
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
https://linux.oracle.com/cve/CVE-2016-0763.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0763
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160314101138/http://www.securityfocus.com/bid/83326
https://web.archive.org/web/20160404202803/http://www.securitytracker.com/id/1035069
https://www.cve.org/CVERecord?id=CVE-2016-0763
|
| tomcat-jsp-2.2-api |
CVE-2016-3092 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://jvn.jp/en/jp/JVN89379547/index.html
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E
http://markmail.org/message/oyxfv73jb2g7rjg3
http://rhn.redhat.com/errata/RHSA-2016-2068.html
http://rhn.redhat.com/errata/RHSA-2016-2069.html
http://rhn.redhat.com/errata/RHSA-2016-2070.html
http://rhn.redhat.com/errata/RHSA-2016-2071.html
http://rhn.redhat.com/errata/RHSA-2016-2072.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://svn.apache.org/viewvc?view=revision&revision=1743480
http://svn.apache.org/viewvc?view=revision&revision=1743722
http://svn.apache.org/viewvc?view=revision&revision=1743738
http://svn.apache.org/viewvc?view=revision&revision=1743742
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3609
http://www.debian.org/security/2016/dsa-3611
http://www.debian.org/security/2016/dsa-3614
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91453
http://www.securitytracker.com/id/1036427
http://www.securitytracker.com/id/1036900
http://www.securitytracker.com/id/1037029
http://www.securitytracker.com/id/1039606
http://www.ubuntu.com/usn/USN-3024-1
http://www.ubuntu.com/usn/USN-3027-1
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/security/cve/CVE-2016-3092
https://bugzilla.redhat.com/show_bug.cgi?id=1349468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092
https://github.com/advisories/GHSA-fvm3-cfvj-gxqq
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759
https://linux.oracle.com/cve/CVE-2016-3092.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-3092
https://security.gentoo.org/glsa/201705-09
https://security.gentoo.org/glsa/202107-39
https://security.netapp.com/advisory/ntap-20190212-0001
https://security.netapp.com/advisory/ntap-20190212-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://ubuntu.com/security/notices/USN-3027-1
https://web.archive.org/web/20160726114129/http://www.securitytracker.com/id/1036427
https://web.archive.org/web/20160924080828/http://www.securityfocus.com/bid/91453
https://web.archive.org/web/20170317103106/http://www.securitytracker.com/id/1037029
https://web.archive.org/web/20171103224941/http://www.securitytracker.com/id/1036900
https://web.archive.org/web/20171111060434/http://www.securitytracker.com/id/1039606
https://www.cve.org/CVERecord?id=CVE-2016-3092
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| tomcat-jsp-2.2-api |
CVE-2016-5388 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
http://rhn.redhat.com/errata/RHSA-2016-1624.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/91818
http://www.securitytracker.com/id/1036331
https://access.redhat.com/errata/RHSA-2016:1624
https://access.redhat.com/errata/RHSA-2016:1635
https://access.redhat.com/errata/RHSA-2016:1636
https://access.redhat.com/errata/RHSA-2016:2045
https://access.redhat.com/errata/RHSA-2016:2046
https://access.redhat.com/security/cve/CVE-2016-5388
https://bugzilla.redhat.com/show_bug.cgi?id=1353809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/1b91e91194a095ea922f96d1dccddf6fbc446e54
https://github.com/apache/tomcat/commit/880250877b0643956435282afb9c111450cfff4c
https://github.com/apache/tomcat/commit/fb3569fbb9a2f55459aa8e1e22bc35a737e66329
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5388.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5388
https://rhn.redhat.com/errata/RHSA-2016-1624.html
https://rhn.redhat.com/errata/RHSA-2016-2045.html
https://rhn.redhat.com/errata/RHSA-2016-2046.html
https://tomcat.apache.org/tomcat-7.0-doc/changelog.html
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4791-1
https://www.apache.org/security/asf-httpoxy-response.txt
https://www.cve.org/CVERecord?id=CVE-2016-5388
https://www.kb.cert.org/vuls/id/797896
|
| tomcat-jsp-2.2-api |
CVE-2016-6816 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-11.el7_3 |
http://rhn.redhat.com/errata/RHSA-2017-0244.html
http://rhn.redhat.com/errata/RHSA-2017-0245.html
http://rhn.redhat.com/errata/RHSA-2017-0246.html
http://rhn.redhat.com/errata/RHSA-2017-0247.html
http://rhn.redhat.com/errata/RHSA-2017-0250.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-0527.html
http://www.debian.org/security/2016/dsa-3738
http://www.openwall.com/lists/oss-security/2016/11/22/17
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/94461
http://www.securitytracker.com/id/1037332
https://access.redhat.com/articles/2991951
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:0935
https://access.redhat.com/security/cve/CVE-2016-6816
https://access.redhat.com/solutions/2891171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816
https://github.com/apache/tomcat/commit/516bda676ac8d0284da3e0295a7df70391315360
https://github.com/apache/tomcat/commit/cdc0a935c2173aff60039a0b85e57a461381107c
https://github.com/apache/tomcat/commit/f96f5751d418ae5a2f550be040daf9c5f7d99256
https://github.com/apache/tomcat80/commit/779d5d34e68e50d2f721897050b147106992f566
https://linux.oracle.com/cve/CVE-2016-6816.html
https://linux.oracle.com/errata/ELSA-2017-0935.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6816
https://security.netapp.com/advisory/ntap-20180607-0001
https://security.netapp.com/advisory/ntap-20180607-0001/
https://svn.apache.org/viewvc?view=revision&revision=1767641
https://svn.apache.org/viewvc?view=revision&revision=1767645
https://svn.apache.org/viewvc?view=revision&revision=1767653
https://svn.apache.org/viewvc?view=revision&revision=1767675
https://svn.apache.org/viewvc?view=revision&revision=1767683
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161204121236/http://www.securityfocus.com/bid/94461
https://web.archive.org/web/20170929085438/http://www.securitytracker.com/id/1037332
https://www.cve.org/CVERecord?id=CVE-2016-6816
https://www.exploit-db.com/exploits/41783
https://www.exploit-db.com/exploits/41783/
|
| tomcat-jsp-2.2-api |
CVE-2017-12616 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.securityfocus.com/bid/100897
http://www.securitytracker.com/id/1039393
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/security/cve/CVE-2017-12616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12616
https://github.com/apache/tomcat
https://lists.apache.org/thread.html/1df9b4552464caa42047062fe7175da0da06c18ecc8daf99258bbda6%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1df9b4552464caa42047062fe7175da0da06c18ecc8daf99258bbda6@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2017-12616
https://security.netapp.com/advisory/ntap-20171018-0001
https://security.netapp.com/advisory/ntap-20171018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://www.cve.org/CVERecord?id=CVE-2017-12616
https://www.synology.com/support/security/Synology_SA_17_54_Tomcat
|
| tomcat-jsp-2.2-api |
CVE-2017-5648 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-12.el7_3 |
http://www.debian.org/security/2017/dsa-3842
http://www.debian.org/security/2017/dsa-3843
http://www.openwall.com/lists/oss-security/2017/04/10/23
http://www.openwall.com/lists/oss-security/2020/07/20/8
http://www.securityfocus.com/bid/97530
http://www.securitytracker.com/id/1038220
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:1809
https://access.redhat.com/security/cve/CVE-2017-5648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5648
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0f7b9465d594b9814e1853d1e3a6e3aa51a21610
https://github.com/apache/tomcat/commit/6bb36dfdf6444efda074893dff493b9eb3648808
https://github.com/apache/tomcat/commit/dfa40863421d7681fed893b4256666491887e38c
https://github.com/apache/tomcat80/commit/6d73b079c55ee25dea1bbd0556bb568a4247dacd
https://linux.oracle.com/cve/CVE-2017-5648.html
https://linux.oracle.com/errata/ELSA-2017-1809.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5648
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180614-0001
https://security.netapp.com/advisory/ntap-20180614-0001/
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170417124117/http://www.securityfocus.com/bid/97530
https://web.archive.org/web/20170420115120/http://www.securitytracker.com/id/1038220
https://www.cve.org/CVERecord?id=CVE-2017-5648
|
| tomcat-jsp-2.2-api |
CVE-2017-7674 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.debian.org/security/2017/dsa-3974
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/100280
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/security/cve/CVE-2017-7674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7674
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/52382ebfbce20a98b01cd9d37184a12703987a5a
https://github.com/apache/tomcat/commit/9044c1672bbe4b2cf4c55028cc8b977cc62650e7
https://github.com/apache/tomcat/commit/b94478d45b7e1fc06134a785571f78772fa30fed
https://github.com/apache/tomcat80/commit/f52c242d92d4563dd1226dcc993ec37370ba9ce3
https://linux.oracle.com/cve/CVE-2017-7674.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/22b4bb077502f847e2b9fcf00b96e81e734466ab459780ff73b60c0f%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/22b4bb077502f847e2b9fcf00b96e81e734466ab459780ff73b60c0f@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread/bol4f8wyjfsbo135tw9gy49o5nf8qpth
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7674
https://security.netapp.com/advisory/ntap-20180614-0003
https://security.netapp.com/advisory/ntap-20180614-0003/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://svn.apache.org/viewvc?view=revision&revision=1795816
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20171115015045/http://www.securityfocus.com/bid/100280
https://web.archive.org/web/20210116171055/http://www.securityfocus.com/bid/100280
https://www.cve.org/CVERecord?id=CVE-2017-7674
|
| tomcat-jsp-2.2-api |
CVE-2018-11784 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.91
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.34
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.12
http://www.securityfocus.com/bid/105524
https://access.redhat.com/errata/RHSA-2019:0130
https://access.redhat.com/errata/RHSA-2019:0131
https://access.redhat.com/errata/RHSA-2019:0485
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/security/cve/CVE-2018-11784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11784
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/advisories/GHSA-5q99-f34m-67gc
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/b76e1dfb3dec3789cc700f8d022c872eb947a221
https://github.com/apache/tomcat/commit/efb860b3ff8ebcf606199b8d0d432f76898040da
https://github.com/apache/tomcat/commit/f9f147359b7c95511b64cd99bbc47917c01b3879
https://kc.mcafee.com/corporate/index?page=content&id=SB10284
https://linux.oracle.com/cve/CVE-2018-11784.html
https://linux.oracle.com/errata/ELSA-2019-1529.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP
https://nvd.nist.gov/vuln/detail/CVE-2018-11784
https://seclists.org/bugtraq/2019/Dec/43
https://security.netapp.com/advisory/ntap-20181014-0002
https://security.netapp.com/advisory/ntap-20181014-0002/
https://ubuntu.com/security/notices/USN-3787-1
https://usn.ubuntu.com/3787-1
https://usn.ubuntu.com/3787-1/
https://web.archive.org/web/20200227030058/http://www.securityfocus.com/bid/105524
https://www.cve.org/CVERecord?id=CVE-2018-11784
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat-jsp-2.2-api |
CVE-2018-1304 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103170
http://www.securitytracker.com/id/1040427
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:1320
https://access.redhat.com/errata/RHSA-2018:1447
https://access.redhat.com/errata/RHSA-2018:1448
https://access.redhat.com/errata/RHSA-2018:1449
https://access.redhat.com/errata/RHSA-2018:1450
https://access.redhat.com/errata/RHSA-2018:1451
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-1304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1304
https://github.com/advisories/GHSA-6rxj-58jh-436r
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2d69fde135302e8cff984bb2131ec69f2e396964
https://github.com/apache/tomcat/commit/5af7c13cff7cc8366c5997418e820989fabb8f48
https://github.com/apache/tomcat/commit/723ea6a5bc5e7bc49e5ef84273c3b3c164a6a4fd
https://github.com/apache/tomcat80/commit/9e700b93e3bf5c605267d20568a964169f9e0b79
https://linux.oracle.com/cve/CVE-2018-1304.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1304
https://security.netapp.com/advisory/ntap-20180706-0001
https://security.netapp.com/advisory/ntap-20180706-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20200227102806/http://www.securityfocus.com/bid/103170
https://web.archive.org/web/20200516074457/http://www.securitytracker.com/id/1040427
https://www.cve.org/CVERecord?id=CVE-2018-1304
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-jsp-2.2-api |
CVE-2018-1305 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103144
http://www.securitytracker.com/id/1040428
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:1320
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-1305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1305
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2349801827f09fb6582a8afdeca704294106ad9a
https://github.com/apache/tomcat/commit/2aac69f694d42d9219eb27018b3da0ae1bdd73ab
https://github.com/apache/tomcat/commit/3e54b2a6314eda11617ff7a7b899c251e222b1a1
https://github.com/apache/tomcat/commit/4d637bc3986e5d09b9363e2144b8ba74fa6eac3a
https://github.com/apache/tomcat/commit/c63b96d72cd39287e17b2ba698f4eee0ba508073
https://github.com/apache/tomcat/commit/de6b4fd58b64828f374503b9ec76a12017b92895
https://linux.oracle.com/cve/CVE-2018-1305.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1305
https://security.netapp.com/advisory/ntap-20180706-0001
https://security.netapp.com/advisory/ntap-20180706-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20200227030042/http://www.securityfocus.com/bid/103144
https://web.archive.org/web/20200516094320/http://www.securitytracker.com/id/1040428
https://www.cve.org/CVERecord?id=CVE-2018-1305
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-jsp-2.2-api |
CVE-2018-8014 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.89
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.53
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.32
http://tomcat.apache.org/security-9.html
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.9
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104203
http://www.securitytracker.com/id/1040998
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:2469
https://access.redhat.com/errata/RHSA-2018:2470
https://access.redhat.com/errata/RHSA-2018:3768
https://access.redhat.com/errata/RHSA-2019:0450
https://access.redhat.com/errata/RHSA-2019:0451
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-8014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8014
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/advisories/GHSA-r4x2-3cq5-hqvp
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/5877390a9605f56d9bd6859a54ccbfb16374a78b
https://github.com/apache/tomcat/commit/60f596a21fd6041335a3a1a4015d4512439cecb5
https://github.com/apache/tomcat/commit/d83a76732e6804739b81d8b2056365307637b42d
https://github.com/apache/tomcat80/commit/2c9d8433bd3247a2856d4b2555447108758e813e
https://linux.oracle.com/cve/CVE-2018-8014.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://nvd.nist.gov/vuln/detail/CVE-2018-8014
https://seclists.org/bugtraq/2019/Dec/43
https://security.netapp.com/advisory/ntap-20181018-0002
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20181017143233/http://www.securityfocus.com/bid/104203
https://web.archive.org/web/20201207080723/http://www.securitytracker.com/id/1041888
https://web.archive.org/web/20201207101131/http://www.securitytracker.com/id/1040998
https://www.cve.org/CVERecord?id=CVE-2018-8014
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| tomcat-jsp-2.2-api |
CVE-2022-23181 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-23181
https://github.com/apache/tomcat
https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9
https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23181
https://security.netapp.com/advisory/ntap-20220217-0010
https://security.netapp.com/advisory/ntap-20220217-0010/
https://www.cve.org/CVERecord?id=CVE-2022-23181
https://www.debian.org/security/2022/dsa-5265
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
|
| tomcat-jsp-2.2-api |
CVE-2023-24998 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/05/22/1
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-24998
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://commons.apache.org/proper/commons-fileupload/security-reports.html
https://commons.apache.org/proper/commons-fileupload/security-reports.html#Fixed_in_Apache_Commons_FileUpload_1.5
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/commons-fileupload
https://github.com/apache/commons-fileupload/commit/e20c04990f7420ca917e96a84cec58b13a1b3d17
https://github.com/apache/tomcat/commit/8a2285f13affa961cc65595aad999db5efae45ce
https://github.com/apache/tomcat/commit/9ca96c8c1eba86c0aaa2e6be581ba2a7d4d4ae6e
https://github.com/apache/tomcat/commit/cf77cc545de0488fb89e24294151504a7432df74
https://github.com/apache/tomcat/commit/d53d8e7f77042cc32a3b98f589496a1ef5088e38
https://linux.oracle.com/cve/CVE-2023-24998.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-24998
https://security.gentoo.org/glsa/202305-37
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-24998
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-jsp-2.2-api |
CVE-2023-28708 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-28708
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://bz.apache.org/bugzilla/show_bug.cgi?id=66471
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3b51230764da595bb19e8d0962dd8c69ab40dfab
https://github.com/apache/tomcat/commit/5b72c94e8b2c4ada63a1d91dc527bf4d8fd1f510
https://github.com/apache/tomcat/commit/c64d496dda1560b5df113be55fbfaefec349b50f
https://github.com/apache/tomcat/commit/f509bbf31fc00abe3d9f25ebfabca5e05173da5b
https://linux.oracle.com/cve/CVE-2023-28708.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/hdksc59z3s7tm39x0pp33mtwdrt8qr67
https://nvd.nist.gov/vuln/detail/CVE-2023-28708
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-28708
|
| tomcat-jsp-2.2-api |
CVE-2023-28709 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/05/22/1
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-28709
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-28709.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j
https://nvd.nist.gov/vuln/detail/CVE-2023-28709
https://security.gentoo.org/glsa/202305-37
https://security.netapp.com/advisory/ntap-20230616-0004
https://security.netapp.com/advisory/ntap-20230616-0004/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-28709
https://www.debian.org/security/2023/dsa-5521
|
| tomcat-jsp-2.2-api |
CVE-2023-41080 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-41080
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/4998ad745b67edeadefe541c94ed029b53933d3b
https://github.com/apache/tomcat/commit/77c0ce2d169efa248b64b992e547aad549ec906b
https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27
https://github.com/apache/tomcat/commit/e3703c9abb8fe0d5602f6ba8a8f11d4b6940815a
https://linux.oracle.com/cve/CVE-2023-41080.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-41080
https://security.netapp.com/advisory/ntap-20230921-0006
https://security.netapp.com/advisory/ntap-20230921-0006/
https://www.cve.org/CVERecord?id=CVE-2023-41080
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-jsp-2.2-api |
CVE-2023-42794 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/8
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-42794
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-42794.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/vvbr2ms7lockj1hlhz5q3wmxb2mwcw82
https://nvd.nist.gov/vuln/detail/CVE-2023-42794
https://www.cve.org/CVERecord?id=CVE-2023-42794
|
| tomcat-jsp-2.2-api |
CVE-2023-42795 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/9
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-42795
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-42795.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/065jfyo583490r9j2v73nhpyxdob56lw
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-42795
https://security.netapp.com/advisory/ntap-20231103-0007
https://security.netapp.com/advisory/ntap-20231103-0007/
https://www.cve.org/CVERecord?id=CVE-2023-42795
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-jsp-2.2-api |
CVE-2023-45648 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/10
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-45648
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/59583245639d8c42ae0009f4a4a70464d3ea70a0
https://github.com/apache/tomcat/commit/8ecff306507be8e4fd3adee1ae5de1ea6661a8f4
https://github.com/apache/tomcat/commit/eb5c094e5560764cda436362254997511a3ca1f6
https://linux.oracle.com/cve/CVE-2023-45648.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdp
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-45648
https://security.netapp.com/advisory/ntap-20231103-0007
https://security.netapp.com/advisory/ntap-20231103-0007/
https://www.cve.org/CVERecord?id=CVE-2023-45648
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-jsp-2.2-api |
CVE-2014-0096 |
LOW |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/135
http://secunia.com/advisories/59121
http://secunia.com/advisories/59616
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://svn.apache.org/viewvc?view=revision&revision=1578610
http://svn.apache.org/viewvc?view=revision&revision=1578611
http://svn.apache.org/viewvc?view=revision&revision=1578637
http://svn.apache.org/viewvc?view=revision&revision=1578655
http://svn.apache.org/viewvc?view=revision&revision=1585853
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.novell.com/support/kb/doc.php?id=7010166
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67667
http://www.securitytracker.com/id/1030301
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3c53c4da7bcf300f519eaed5ad1751d24dd59f6b
https://github.com/apache/tomcat/commit/5c545da226b3c71ed9603c38ad2de88057778c1b
https://github.com/apache/tomcat/commit/913d94b289e056107e521dbab8e79cc72a62a331
https://github.com/apache/tomcat/commit/970c23bfd24dfa1dcb86ed917e6c8b47dcfb4433
https://github.com/apache/tomcat80/commit/65ed69d96a101dfa99eea2cfe17e9e87b310084c
https://github.com/apache/tomcat80/commit/f3f2979df693a9c84c6742fcb162f3671b0a50d3
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0096.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0096
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0096
|
| tomcat-jsp-2.2-api |
CVE-2014-0119 |
LOW |
7.0.42-4.el7 |
7.0.42-8.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/141
http://secunia.com/advisories/59732
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://svn.apache.org/viewvc?view=revision&revision=1588193
http://svn.apache.org/viewvc?view=revision&revision=1588199
http://svn.apache.org/viewvc?view=revision&revision=1589640
http://svn.apache.org/viewvc?view=revision&revision=1589837
http://svn.apache.org/viewvc?view=revision&revision=1589980
http://svn.apache.org/viewvc?view=revision&revision=1589983
http://svn.apache.org/viewvc?view=revision&revision=1589985
http://svn.apache.org/viewvc?view=revision&revision=1589990
http://svn.apache.org/viewvc?view=revision&revision=1589992
http://svn.apache.org/viewvc?view=revision&revision=1589997
http://svn.apache.org/viewvc?view=revision&revision=1590028
http://svn.apache.org/viewvc?view=revision&revision=1590036
http://svn.apache.org/viewvc?view=revision&revision=1593815
http://svn.apache.org/viewvc?view=revision&revision=1593821
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67669
http://www.securitytracker.com/id/1030298
http://www.ubuntu.com/usn/USN-2654-1
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/080878ea519d8c74c53721a9ebf7be6fcf6f1f2f
https://github.com/apache/tomcat/commit/50311bed8d87e452ff0e69838ba312c4fe899b2d
https://github.com/apache/tomcat/commit/5517c5517e8a7ddb994504f0c5c05001a376b10c
https://github.com/apache/tomcat/commit/5aae1323c31d643afa9f2db80713b8e97b5123af
https://github.com/apache/tomcat/commit/6246d8307fb5f2b4ff0b0f4d6d1b0250dff01a81
https://github.com/apache/tomcat/commit/769477b9bc8442db3f571385fa0c3e206242cbf1
https://github.com/apache/tomcat/commit/934f884f330dad192d2c5dc950e28f4cd281461b
https://github.com/apache/tomcat/commit/ad3b34a290a0255d2a4c356a3611ab41ed9d04f5
https://github.com/apache/tomcat/commit/ce70ee6b8fe437a498a375215011056702b0c481
https://github.com/apache/tomcat/commit/ebe5c16f18ce1559e8462a94b3876a98525980d2
https://github.com/apache/tomcat/commit/f8b316acbbf9fabf87cc137e9777e912eda0d834
https://github.com/apache/tomcat80/commit/25251de791a6a7be13f2f3d3a66119a77025272d
https://github.com/apache/tomcat80/commit/4d90e355dc5ced4c53585c2b4700f71a52d8f447
https://github.com/apache/tomcat80/commit/51e59532ad4c604f55575963dc7a7f0250cb420f
https://github.com/apache/tomcat80/commit/69a8a72283c3395ece8b899cf8562e126de97a27
https://github.com/apache/tomcat80/commit/77e014cef5d5af619bcf77eaebf22c284d420802
https://github.com/apache/tomcat80/commit/7d33457de5fc5a652a88fb9bbc9ba4cbbda58f04
https://github.com/apache/tomcat80/commit/d59fd4398c8ae6361e0b13c491f66b51e49a7441
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0119.html
https://linux.oracle.com/errata/ELSA-2014-1038.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0119
https://ubuntu.com/security/notices/USN-2654-1
https://www.cve.org/CVERecord?id=CVE-2014-0119
|
| tomcat-jsp-2.2-api |
CVE-2014-0230 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://mail-archives.apache.org/mod_mbox/tomcat-announce/201505.mbox/%3C554949D1.8030904%40apache.org%3E
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://openwall.com/lists/oss-security/2015/04/10/1
http://rhn.redhat.com/errata/RHSA-2015-1621.html
http://rhn.redhat.com/errata/RHSA-2015-1622.html
http://rhn.redhat.com/errata/RHSA-2015-2661.html
http://rhn.redhat.com/errata/RHSA-2016-0595.html
http://rhn.redhat.com/errata/RHSA-2016-0596.html
http://rhn.redhat.com/errata/RHSA-2016-0597.html
http://rhn.redhat.com/errata/RHSA-2016-0598.html
http://rhn.redhat.com/errata/RHSA-2016-0599.html
http://svn.apache.org/viewvc?view=revision&revision=1603770
http://svn.apache.org/viewvc?view=revision&revision=1603775
http://svn.apache.org/viewvc?view=revision&revision=1603779
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.44
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.9
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/74475
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/errata/RHSA-2015:2659
https://access.redhat.com/errata/RHSA-2015:2660
https://access.redhat.com/security/cve/CVE-2014-0230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0230
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6b2cfacf749be186ea77249a979af1d4863e47ba
https://github.com/apache/tomcat/commit/812088583d0e60717a8fe9c6d14e12bcdc3e6c51
https://github.com/apache/tomcat/commit/b1c8477e3e3ee635d19cc4d5987c2b157431e0c1
https://github.com/apache/tomcat/commit/c1357e649641844109711d60cacb98e4b5fcd3cb
https://github.com/apache/tomcat/commit/e28dd578fad90a6d5726ec34f3245c9f99d909a5
https://github.com/apache/tomcat/commit/e3146f4b03a2386c3e57597e86134d4ed5c31303
https://github.com/apache/tomcat/commit/fc049912464f0dcf9dede3761f38049369057e16
https://github.com/apache/tomcat/commit/fdd9f11dc24b95e5425076abb58e968336f320a2
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://issues.jboss.org/browse/JWS-219
https://issues.jboss.org/browse/JWS-220
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0230
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-0230
|
| tomcat-jsp-2.2-api |
CVE-2015-5174 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://packetstormsecurity.com/files/135883/Apache-Tomcat-Limited-Directory-Traversal.html
http://rhn.redhat.com/errata/RHSA-2016-1435.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://seclists.org/bugtraq/2016/Feb/149
http://svn.apache.org/viewvc?view=revision&revision=1696281
http://svn.apache.org/viewvc?view=revision&revision=1696284
http://svn.apache.org/viewvc?view=revision&revision=1700897
http://svn.apache.org/viewvc?view=revision&revision=1700898
http://svn.apache.org/viewvc?view=revision&revision=1700900
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83329
http://www.securitytracker.com/id/1035070
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1432
https://access.redhat.com/errata/RHSA-2016:1433
https://access.redhat.com/errata/RHSA-2016:1434
https://access.redhat.com/security/cve/CVE-2015-5174
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5174.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r0b24f2c7507f702348e2c2d64e8a5de72bad6173658e8d8e45322ac2%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r0b24f2c7507f702348e2c2d64e8a5de72bad6173658e8d8e45322ac2@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd4863c79bf729aabb95571fd845a9ea4ee3ae3fcee48f35aba007350%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd4863c79bf729aabb95571fd845a9ea4ee3ae3fcee48f35aba007350@%3Cusers.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5174
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://www.cve.org/CVERecord?id=CVE-2015-5174
|
| tomcat-jsp-2.2-api |
CVE-2015-5345 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://packetstormsecurity.com/files/135892/Apache-Tomcat-Directory-Disclosure.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://seclists.org/bugtraq/2016/Feb/146
http://seclists.org/fulldisclosure/2016/Feb/122
http://svn.apache.org/viewvc?view=revision&revision=1715206
http://svn.apache.org/viewvc?view=revision&revision=1715207
http://svn.apache.org/viewvc?view=revision&revision=1715213
http://svn.apache.org/viewvc?view=revision&revision=1715216
http://svn.apache.org/viewvc?view=revision&revision=1716882
http://svn.apache.org/viewvc?view=revision&revision=1716894
http://svn.apache.org/viewvc?view=revision&revision=1717209
http://svn.apache.org/viewvc?view=revision&revision=1717212
http://svn.apache.org/viewvc?view=revision&revision=1717216
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.qcsec.com/blog/CVE-2015-5345-apache-tomcat-vulnerability.html
http://www.securityfocus.com/bid/83328
http://www.securitytracker.com/id/1035071
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5345
https://bto.bluecoat.com/security-advisory/sa118
https://bz.apache.org/bugzilla/show_bug.cgi?id=58765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/127d8ea86d245846f0472865f0eb1eb111955e71
https://github.com/apache/tomcat/commit/58c09b6217c546e1a251a82da227018f05277228
https://github.com/apache/tomcat/commit/66daa4adc14b3e939659879153c0a579fdfcb099
https://github.com/apache/tomcat/commit/7288bc70a14edcfeff0a96e333a858be374cfc64
https://github.com/apache/tomcat/commit/816552abf6735fa37dfd37c8a7bfbdbd045477e0
https://github.com/apache/tomcat/commit/8437193708e4bf6b2861a7953dc472f9dad49111
https://github.com/apache/tomcat/commit/89cd0cf33a99dbbcf5c69050a83b6876e39269d7
https://github.com/apache/tomcat/commit/a273b5f45cb46a273d06510a689fc314155a952d
https://github.com/apache/tomcat/commit/c584c7c4ab0686e4125eefcd0afb32fb8269da3d
https://github.com/apache/tomcat80/commit/2b643a4e36d318d55ec57fee57610671656d23c0
https://github.com/apache/tomcat80/commit/c15c2aba8eb42425f9ebcfcaef579dada38ad3a2
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://kc.mcafee.com/corporate/index?page=content&id=SB10156
https://linux.oracle.com/cve/CVE-2015-5345.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5345
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321235514/http://www.securitytracker.com/id/1035071
https://web.archive.org/web/20160804024910/http://www.securityfocus.com/bid/83328
https://www.cve.org/CVERecord?id=CVE-2015-5345
|
| tomcat-jsp-2.2-api |
CVE-2015-5346 |
LOW |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://packetstormsecurity.com/files/135890/Apache-Tomcat-Session-Fixation.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/143
http://svn.apache.org/viewvc?view=revision&revision=1713184
http://svn.apache.org/viewvc?view=revision&revision=1713185
http://svn.apache.org/viewvc?view=revision&revision=1713187
http://svn.apache.org/viewvc?view=revision&revision=1723414
http://svn.apache.org/viewvc?view=revision&revision=1723506
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83323
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5346
https://bto.bluecoat.com/security-advisory/sa118
https://bz.apache.org/bugzilla/show_bug.cgi?id=58809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/04164c1f01b973e548d95511d417f414ca723cb8
https://github.com/apache/tomcat/commit/6287be37d8d06c320215c45f7e2b8380411692e0
https://github.com/apache/tomcat/commit/83679b99cd40caa401d173c8f8e72fc98eb5d5be
https://github.com/apache/tomcat80/commit/41fbee7ba15435a831f765597ff907c56ebf2169
https://github.com/apache/tomcat80/commit/c39b7ffc2145644f7f3cf9e3cd4aada5048e56a0
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5346.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5346
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20160912063818/http://www.securityfocus.com/bid/83323
https://www.cve.org/CVERecord?id=CVE-2015-5346
|
| tomcat-jsp-2.2-api |
CVE-2016-0706 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/144
http://svn.apache.org/viewvc?view=revision&revision=1722799
http://svn.apache.org/viewvc?view=revision&revision=1722800
http://svn.apache.org/viewvc?view=revision&revision=1722801
http://svn.apache.org/viewvc?view=revision&revision=1722802
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83324
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0706
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706
https://github.com/apache/tomcat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2016-0706.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0706
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160226210040/http://www.securityfocus.com/bid/83324
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://www.cve.org/CVERecord?id=CVE-2016-0706
|
| tomcat-jsp-2.2-api |
CVE-2016-0762 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/pzuk6hauzljnm4r7?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93939
http://www.securitytracker.com/id/1037144
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-0762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0762
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/86b2e436099cb48f30dad950175c5beeeb763756
https://github.com/apache/tomcat/commit/970e615c7ade6ec6c341470bbc76aa1256353737
https://github.com/apache/tomcat/commit/d79c63d424fe6b225678416343b9ce106dec947c
https://github.com/apache/tomcat80/commit/dc4c3317452f0bc2c5e1f6a08d3bd9f22488b450
https://linux.oracle.com/cve/CVE-2016-0762.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/1872f96bad43647832bdd84a408794cd06d9cbb557af63085ca10009%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1872f96bad43647832bdd84a408794cd06d9cbb557af63085ca10009@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0762
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://www.cve.org/CVERecord?id=CVE-2016-0762
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-jsp-2.2-api |
CVE-2016-5018 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/lixw6iyojoxwfizv?q=list:org.apache.tomcat.announce/
http://packetstormsecurity.com/files/155873/Tomcat-9.0.0.M1-Sandbox-Escape.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-1551.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93942
http://www.securitytracker.com/id/1037142
http://www.securitytracker.com/id/1038757
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:1548
https://access.redhat.com/errata/RHSA-2017:1549
https://access.redhat.com/errata/RHSA-2017:1550
https://access.redhat.com/errata/RHSA-2017:1552
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-5018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5018
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/648122fef84d3b43223e0b5ae668f84719dada0a
https://github.com/apache/tomcat/commit/890a2f681ed2f3461b27983d7da9737375ff2ae4
https://github.com/apache/tomcat/commit/a6b1ebc246b91b854237e5aad3dfd2b5460ea282
https://linux.oracle.com/cve/CVE-2016-5018.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9b3a63a20c87179815fdea14f6766853bafe79a0042dc0b4aa878a9e%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9b3a63a20c87179815fdea14f6766853bafe79a0042dc0b4aa878a9e@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-5018
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161125134649/http://www.securityfocus.com/bid/93942
https://web.archive.org/web/20170908024318/http://www.securitytracker.com/id/1037142
https://web.archive.org/web/20171012232225/http://www.securitytracker.com/id/1038757
https://www.cve.org/CVERecord?id=CVE-2016-5018
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-jsp-2.2-api |
CVE-2016-6325 |
LOW |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93478
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/security/cve/CVE-2016-6325
https://bugzilla.redhat.com/show_bug.cgi?id=1367447
https://linux.oracle.com/cve/CVE-2016-6325.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6325
https://www.cve.org/CVERecord?id=CVE-2016-6325
|
| tomcat-jsp-2.2-api |
CVE-2016-6794 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/zk7w6yly5mviocci?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93943
http://www.securitytracker.com/id/1037143
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6794
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0b41766456b1980e4f809e13ad6dc9fa912bae7e
https://github.com/apache/tomcat/commit/c1660182010b4255c21c874d69c124370a67784a
https://github.com/apache/tomcat/commit/f8db078f1e6e8b225f8344e63595113ca34cd408
https://github.com/apache/tomcat80/commit/ae6163a4f230bc679abfc93e048ff92996badad6
https://linux.oracle.com/cve/CVE-2016-6794.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/09d2f2c65ac4ff5da42f15dc2b0f78b655e50f1a42e8a9784134a9eb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/09d2f2c65ac4ff5da42f15dc2b0f78b655e50f1a42e8a9784134a9eb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6794
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20170317100547/http://www.securitytracker.com/id/1037143
https://web.archive.org/web/20170626130744/http://www.securityfocus.com/bid/93943
https://www.cve.org/CVERecord?id=CVE-2016-6794
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-jsp-2.2-api |
CVE-2016-6796 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/hynaeawxxhpvvctu?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-1551.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93944
http://www.securitytracker.com/id/1037141
http://www.securitytracker.com/id/1038757
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:1548
https://access.redhat.com/errata/RHSA-2017:1549
https://access.redhat.com/errata/RHSA-2017:1550
https://access.redhat.com/errata/RHSA-2017:1552
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/f603f2f4595073f9490e01699d2083112a7c09a7
https://github.com/apache/tomcat/commit/f97769f50ee2613e1bf27107a01d48907fd993ac
https://github.com/apache/tomcat/commit/ffa0346fba2946401630291b642f1cff66d6a2be
https://github.com/apache/tomcat80/commit/d98fa92b9dfc90fe1ffdaa3cce1be3be84532260
https://linux.oracle.com/cve/CVE-2016-6796.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5a2105a56b2495ab70fa568f06925bd861f0d71ffab4fb38bb4fdc45%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5a2105a56b2495ab70fa568f06925bd861f0d71ffab4fb38bb4fdc45@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6796
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161029105733/http://www.securityfocus.com/bid/93944
https://web.archive.org/web/20161103080055/http://www.securitytracker.com/id/1037141
https://web.archive.org/web/20171012232225/http://www.securitytracker.com/id/1038757
https://www.cve.org/CVERecord?id=CVE-2016-6796
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-jsp-2.2-api |
CVE-2016-6797 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/wrku5orwxfpt5mzl?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93940
http://www.securitytracker.com/id/1037145
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2859ac3eae132383cb6f3f2042e25d7a4a281b0d
https://github.com/apache/tomcat/commit/b3406e6c318378cbf440f902f9fdbb8b440aef4e
https://github.com/apache/tomcat/commit/d6b5600afe75e1086dd564344e1d085966e4237d
https://github.com/apache/tomcat80/commit/824c7dc781056442046db0ae34bcf1497f23f44c
https://linux.oracle.com/cve/CVE-2016-6797.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9325837eb00cba5752c092047433c7f0415134d16e7f391447ff4352%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9325837eb00cba5752c092047433c7f0415134d16e7f391447ff4352@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6797
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20170320064509/http://www.securitytracker.com/id/1037145
https://web.archive.org/web/20170423095945/http://www.securityfocus.com/bid/93940
https://www.cve.org/CVERecord?id=CVE-2016-6797
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-jsp-2.2-api |
CVE-2018-8034 |
LOW |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283%40minotaur.apache.org%3E
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3E
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104895
http://www.securitytracker.com/id/1041374
https://access.redhat.com/errata/RHSA-2019:0130
https://access.redhat.com/errata/RHSA-2019:0131
https://access.redhat.com/errata/RHSA-2019:0450
https://access.redhat.com/errata/RHSA-2019:0451
https://access.redhat.com/errata/RHSA-2019:1159
https://access.redhat.com/errata/RHSA-2019:1160
https://access.redhat.com/errata/RHSA-2019:1161
https://access.redhat.com/errata/RHSA-2019:1162
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/errata/RHSA-2019:3892
https://access.redhat.com/security/cve/CVE-2018-8034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8034
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2835bb4e030c1c741ed0847bb3b9c3822e4fbc8a
https://github.com/apache/tomcat/commit/2c522795166c930741a9cecca76797bf48cb1634
https://linux.oracle.com/cve/CVE-2018-8034.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2018-8034
https://security.netapp.com/advisory/ntap-20180817-0001
https://security.netapp.com/advisory/ntap-20180817-0001/
https://ubuntu.com/security/notices/USN-3723-1
https://usn.ubuntu.com/3723-1
https://usn.ubuntu.com/3723-1/
https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104895
https://web.archive.org/web/20200517032514/http://www.securitytracker.com/id/1041374
https://www.cve.org/CVERecord?id=CVE-2018-8034
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat-jsp-2.2-api |
CVE-2019-0221 |
LOW |
7.0.42-4.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html
http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2019/May/50
http://www.securityfocus.com/bid/108545
https://access.redhat.com/errata/RHSA-2019:3929
https://access.redhat.com/errata/RHSA-2019:3931
https://access.redhat.com/security/cve/CVE-2019-0221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0221
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/15fcd166ea2c1bb79e8541b8e1a43da9c452ceea
https://github.com/apache/tomcat/commit/44ec74c44dcd05cd7e90967c04d40b51440ecd7e
https://github.com/apache/tomcat/commit/4fcdf706f3ecf35912a600242f89637f5acb32da
https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46
https://mail-archives.apache.org/mod_mbox/www-announce/201905.mbox/%3Cb1905aa6-f340-8d0b-58c4-8ac3ebcbfa54@apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-0221
https://seclists.org/bugtraq/2019/Dec/43
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20190606-0001
https://security.netapp.com/advisory/ntap-20190606-0001/
https://support.f5.com/csp/article/K13184144?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K13184144?utm_source=f5support&utm_medium=RSS
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4128-1
https://ubuntu.com/security/notices/USN-4128-2
https://usn.ubuntu.com/4128-1
https://usn.ubuntu.com/4128-1/
https://usn.ubuntu.com/4128-2
https://usn.ubuntu.com/4128-2/
https://web.archive.org/web/20200227055048/http://www.securityfocus.com/bid/108545
https://www.cve.org/CVERecord?id=CVE-2019-0221
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221
https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/
|
| tomcat-jsp-2.2-api |
CVE-2019-17563 |
LOW |
7.0.42-4.el7 |
7.0.76-15.el7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html
http://mail-archives.apache.org/mod_mbox/www-announce/201912.mbox/%3C21b7a375-7297-581b-1f8e-06622d36775b@apache.org%3E
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.30
https://access.redhat.com/security/cve/CVE-2019-17563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17563
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2019-17563.html
https://linux.oracle.com/errata/ELSA-2020-4004.html
https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e%40%3Cissues.cxf.apache.org%3E
https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17563
https://seclists.org/bugtraq/2019/Dec/43
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20200107-0001
https://security.netapp.com/advisory/ntap-20200107-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.99
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.50
https://ubuntu.com/security/notices/USN-4251-1
https://usn.ubuntu.com/4251-1
https://usn.ubuntu.com/4251-1/
https://www.cve.org/CVERecord?id=CVE-2019-17563
https://www.debian.org/security/2019/dsa-4596
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
|
| tomcat-jsp-2.2-api |
CVE-2020-1935 |
LOW |
7.0.42-4.el7 |
7.0.76-16.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
https://access.redhat.com/security/cve/CVE-2020-1935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1935
https://linux.oracle.com/cve/CVE-2020-1935.html
https://linux.oracle.com/errata/ELSA-2020-5020.html
https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1935
https://security.netapp.com/advisory/ntap-20200327-0005
https://security.netapp.com/advisory/ntap-20200327-0005/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31
https://ubuntu.com/security/notices/USN-4448-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://www.cve.org/CVERecord?id=CVE-2020-1935
https://www.debian.org/security/2020/dsa-4673
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| tomcat-jsp-2.2-api |
CVE-2021-25329 |
LOW |
7.0.42-4.el7 |
|
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3C811bba77-e74e-9f9b-62ca-5253a09ba84f%40apache.org%3E
http://www.openwall.com/lists/oss-security/2021/03/01/2
https://access.redhat.com/security/cve/CVE-2021-25329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25329
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2021-25329
https://security.gentoo.org/glsa/202208-34
https://security.netapp.com/advisory/ntap-20210409-0002
https://security.netapp.com/advisory/ntap-20210409-0002/
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.108
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43
https://ubuntu.com/security/notices/USN-5360-1
https://www.cve.org/CVERecord?id=CVE-2021-25329
https://www.debian.org/security/2021/dsa-4891
https://www.openwall.com/lists/oss-security/2021/03/01/2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-jsp-2.2-api |
CVE-2022-29885 |
LOW |
7.0.42-4.el7 |
|
http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2022-29885
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0fa7721f11d565a2cd2e44366c388ad6a3e6357d
https://github.com/apache/tomcat/commit/36826ea638457d7e17876a70f89cb435b6db0d91
https://github.com/apache/tomcat/commit/b679bc627f5a4ea6510af95adfb7476b07eba890
https://github.com/apache/tomcat/commit/eaafd28296c54d983e28a47953c1f5cb2c334f48
https://lists.apache.org/thread/2b4qmhbcyqvc7dyfpjyx54c03x65vhcv
https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29885
https://security.netapp.com/advisory/ntap-20220629-0002
https://security.netapp.com/advisory/ntap-20220629-0002/
https://www.cve.org/CVERecord?id=CVE-2022-29885
https://www.debian.org/security/2022/dsa-5265
https://www.oracle.com/security-alerts/cpujul2022.html
|
| tomcat-jsp-2.2-api |
CVE-2022-4132 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-4132
https://bugzilla.redhat.com/show_bug.cgi?id=2147372
https://nvd.nist.gov/vuln/detail/CVE-2022-4132
https://www.cve.org/CVERecord?id=CVE-2022-4132
|
| tomcat-jsp-2.2-api |
CVE-2022-42252 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-42252
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0d089a15047faf9cb3c82f80f4d28febd4798920
https://github.com/apache/tomcat/commit/4c7f4fd09d2cc1692112ef70b8ee23a7a037ae77
https://github.com/apache/tomcat/commit/a1c07906d8dcaf7957e5cc97f5cdbac7d18a205a
https://github.com/apache/tomcat/commit/c9fe754e5d17e262dfbd3eab2a03ca96ff372dc3
https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq
https://nvd.nist.gov/vuln/detail/CVE-2022-42252
https://security.gentoo.org/glsa/202305-37
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2022-42252
|
| tomcat-jsp-2.2-api |
CVE-2022-45143 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-45143
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0cab3a56bd89f70e7481bb0d68395dc7e130dbbf
https://github.com/apache/tomcat/commit/6a0ac6a438cbbb66b6e9c5223842f53bf0cb50aa
https://github.com/apache/tomcat/commit/b336f4e58893ea35114f1e4a415657f723b1298e
https://lists.apache.org/thread/yqkd183xrw3wqvnpcg3osbcryq85fkzj
https://nvd.nist.gov/vuln/detail/CVE-2022-45143
https://security.gentoo.org/glsa/202305-37
https://www.cve.org/CVERecord?id=CVE-2022-45143
|
| tomcat-lib |
CVE-2014-0186 |
HIGH |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://www.osvdb.org/108060
https://access.redhat.com/security/cve/CVE-2014-0186
https://bugzilla.redhat.com/show_bug.cgi?id=1089884
https://linux.oracle.com/cve/CVE-2014-0186.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://nvd.nist.gov/vuln/detail/CVE-2014-0186
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://security-tracker.debian.org/tracker/CVE-2014-0186
https://www.cve.org/CVERecord?id=CVE-2014-0186
|
| tomcat-lib |
CVE-2016-5425 |
HIGH |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
http://legalhackers.com/advisories/Tomcat-RedHat-based-Root-Privilege-Escalation-Exploit.txt
http://packetstormsecurity.com/files/139041/Apache-Tomcat-8-7-6-Privilege-Escalation.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://www.openwall.com/lists/oss-security/2016/10/10/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93472
http://www.securitytracker.com/id/1036979
https://access.redhat.com/security/cve/CVE-2016-5425
https://linux.oracle.com/cve/CVE-2016-5425.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d%40%3Cissues.activemq.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-5425
https://www.cve.org/CVERecord?id=CVE-2016-5425
https://www.exploit-db.com/exploits/40488/
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat-lib |
CVE-2016-8745 |
HIGH |
7.0.42-4.el7 |
7.0.69-11.el7_3 |
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-0527.html
http://www.debian.org/security/2017/dsa-3754
http://www.debian.org/security/2017/dsa-3755
http://www.openwall.com/lists/oss-security/2016/12/12/1
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/94828
http://www.securitytracker.com/id/1037432
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:0935
https://access.redhat.com/security/cve/CVE-2016-8745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/143bb466cf96a89e791b7db5626055ea819dad89
https://github.com/apache/tomcat/commit/16a57bc885e212839f1d717b94b01d154a36943a
https://github.com/apache/tomcat/commit/cbc9b18a845d3c8c053ac293dffda6c6c19dd92b
https://github.com/apache/tomcat80/commit/3dd2fec73e0de1edc1d3eb1c52a01255fdfc84e7
https://linux.oracle.com/cve/CVE-2016-8745.html
https://linux.oracle.com/errata/ELSA-2017-0935.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/4113c05d37f37c12b8033205684f04033c5f7a9bae117d4af23b32b4%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/4113c05d37f37c12b8033205684f04033c5f7a9bae117d4af23b32b4@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8745
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180607-0002
https://security.netapp.com/advisory/ntap-20180607-0002/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9
https://ubuntu.com/security/notices/USN-3177-1
https://web.archive.org/web/20200227165932/http://www.securityfocus.com/bid/94828
https://web.archive.org/web/20200517114357/http://www.securitytracker.com/id/1037432
https://www.cve.org/CVERecord?id=CVE-2016-8745
|
| tomcat-lib |
CVE-2017-12615 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html
http://www.securityfocus.com/bid/100901
http://www.securitytracker.com/id/1039392
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/security/cve/CVE-2017-12615
https://github.com/advisories/GHSA-pjfr-qf3p-3q25
https://github.com/breaktoprotect/CVE-2017-12615
https://linux.oracle.com/cve/CVE-2017-12615.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-12615
https://security.netapp.com/advisory/ntap-20171018-0001
https://security.netapp.com/advisory/ntap-20171018-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
https://www.cve.org/CVERecord?id=CVE-2017-12615
https://www.exploit-db.com/exploits/42953
https://www.exploit-db.com/exploits/42953/
https://www.synology.com/support/security/Synology_SA_17_54_Tomcat
|
| tomcat-lib |
CVE-2017-12617 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/100954
http://www.securitytracker.com/id/1039552
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2018:0268
https://access.redhat.com/errata/RHSA-2018:0269
https://access.redhat.com/errata/RHSA-2018:0270
https://access.redhat.com/errata/RHSA-2018:0271
https://access.redhat.com/errata/RHSA-2018:0275
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/security/cve/CVE-2017-12617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12617
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/24aea94807f940ee44aa550378dc903289039ddd
https://github.com/apache/tomcat/commit/31e99502e2c602449a2f8835bd23ade772b77333
https://github.com/apache/tomcat/commit/327e8a6644e188764325a013aa2725a60f1b37e5
https://github.com/apache/tomcat/commit/46dfedbc0523d7182be97f4244d7b6c942164485
https://github.com/apache/tomcat/commit/4cf7dab88282c8f3c92f0b961cdb0096e1d63e88
https://github.com/apache/tomcat/commit/506d862e7edfa991de198e0f2e4c4540830fa531
https://github.com/apache/tomcat/commit/512a3c3aecdb52de092c6bacddd71b85c4feda06
https://github.com/apache/tomcat/commit/74ad0e216c791454a318c1811300469eedc5c6f3
https://github.com/apache/tomcat/commit/a9dd96046d7acb0357c6b7b9e6cc70d186fae663
https://github.com/apache/tomcat/commit/b577f9a7996b92b650b1649af3c3bae11c120db9
https://github.com/apache/tomcat/commit/b7e0435d17aba69f16ae9e8a78ad0f1565b552af
https://github.com/apache/tomcat/commit/bbcbb749c75056a2781f37038d63e646fe972104
https://github.com/apache/tomcat/commit/c177e9668d1278710bdb14c0eb8d2702b3655f5a
https://github.com/apache/tomcat/commit/cf0b37beb0622abdf24acc7110daf883f3fe4f95
https://github.com/apache/tomcat/commit/d5b170705d24c386d76038e5989045c89795c28c
https://github.com/apache/tomcat/commit/e650cf1b83e441dbd3863f3f6b61c972cafce19e
https://github.com/apache/tomcat/commit/f1b85da754c4760787d68a99e839b50878140b57
https://github.com/apache/tomcat/commit/fd52f8601170b91f9d7162510e54563e5bf6bdfe
https://linux.oracle.com/cve/CVE-2017-12617.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2017-12617
https://security.netapp.com/advisory/ntap-20171018-0002
https://security.netapp.com/advisory/ntap-20171018-0002/
https://security.netapp.com/advisory/ntap-20180117-0002
https://security.netapp.com/advisory/ntap-20180117-0002/
https://support.f5.com/csp/article/K53173544
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03812en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20171110171954/http://www.securityfocus.com/bid/100954
https://web.archive.org/web/20201209024734/http://www.securitytracker.com/id/1039552
https://www.alphabot.com/security/blog/2017/java/Apache-Tomcat-RCE-CVE-2017-12617.html
https://www.cve.org/CVERecord?id=CVE-2017-12617
https://www.exploit-db.com/exploits/42966
https://www.exploit-db.com/exploits/42966/
https://www.exploit-db.com/exploits/43008
https://www.exploit-db.com/exploits/43008/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| tomcat-lib |
CVE-2017-5647 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.arubanetworks.com/assets/alert/HPESBHF03730.txt
http://www.debian.org/security/2017/dsa-3842
http://www.debian.org/security/2017/dsa-3843
http://www.openwall.com/lists/oss-security/2017/04/10/24
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.securitytracker.com/id/1038218
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/security/cve/CVE-2017-5647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/864aa1199ad2cccc9a7e7c6b977f7d7f812c9910
https://github.com/apache/tomcat/commit/a4efd3ca1ccbdfc398136d76c0d8b7ad5a1e4905
https://github.com/apache/tomcat/commit/f5e06b8c743b1daa9eb5e817863958b6b320e044
https://github.com/apache/tomcat80/commit/ec10b8c785d1db91fe58946436f854dde04410fd
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03730en_us
https://linux.oracle.com/cve/CVE-2017-5647.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5796678c5a773c6f3ff57c178ac247d85ceca0dee9190ba48171451a%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5796678c5a773c6f3ff57c178ac247d85ceca0dee9190ba48171451a@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5647
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180614-0001
https://security.netapp.com/advisory/ntap-20180614-0001/
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170420114447/http://www.securitytracker.com/id/1038218
https://www.cve.org/CVERecord?id=CVE-2017-5647
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-lib |
CVE-2017-5664 |
HIGH |
7.0.42-4.el7 |
7.0.69-12.el7_3 |
http://apt.inguza.net/wheezy-security/tomcat/tomcat8-CVE-2017-5664.patch
http://www.debian.org/security/2017/dsa-3891
http://www.debian.org/security/2017/dsa-3892
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/98888
http://www.securitytracker.com/id/1038641
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:1809
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/errata/RHSA-2017:2633
https://access.redhat.com/errata/RHSA-2017:2635
https://access.redhat.com/errata/RHSA-2017:2636
https://access.redhat.com/errata/RHSA-2017:2637
https://access.redhat.com/errata/RHSA-2017:2638
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/security/cve/CVE-2017-5664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/29893e66111d33cfe99dd01cb146317c0c262ef4
https://github.com/apache/tomcat/commit/3242efea525df01d15da6e90ea69a9a21b10b454
https://github.com/apache/tomcat/commit/3bfe9fb886598c4d8ecbe674216152006bbce456
https://github.com/apache/tomcat/commit/4545dcce444aa619374a659cb450dbbd0be3c921
https://github.com/apache/tomcat/commit/58b32048ce25cb812ae394dafb0cd57254c68155
https://github.com/apache/tomcat/commit/7d93527254d9e9371b342800617f20d13c8b85ad
https://github.com/apache/tomcat80/commit/25d3c0d93190ef165ecd6c744bc15b5059abfa8f
https://github.com/apache/tomcat80/commit/e070a31ec81b56377822e44883c64abb41f36a3b
https://linux.oracle.com/cve/CVE-2017-5664.html
https://linux.oracle.com/errata/ELSA-2017-3080.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5664
https://security.netapp.com/advisory/ntap-20171019-0002
https://security.netapp.com/advisory/ntap-20171019-0002/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.78
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.44
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.15
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170801120345/http://www.securitytracker.com/id/1038641
https://web.archive.org/web/20170805032345/http://www.securityfocus.com/bid/98888
https://www.cve.org/CVERecord?id=CVE-2017-5664
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-lib |
CVE-2018-1336 |
HIGH |
7.0.42-4.el7 |
7.0.76-8.el7_5 |
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090435.GA60759%40minotaur.apache.org%3E
http://www.securityfocus.com/bid/104898
http://www.securitytracker.com/id/1041375
https://access.redhat.com/errata/RHEA-2018:2188
https://access.redhat.com/errata/RHEA-2018:2189
https://access.redhat.com/errata/RHSA-2018:2700
https://access.redhat.com/errata/RHSA-2018:2701
https://access.redhat.com/errata/RHSA-2018:2740
https://access.redhat.com/errata/RHSA-2018:2741
https://access.redhat.com/errata/RHSA-2018:2742
https://access.redhat.com/errata/RHSA-2018:2743
https://access.redhat.com/errata/RHSA-2018:2921
https://access.redhat.com/errata/RHSA-2018:2930
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2018:2945
https://access.redhat.com/errata/RHSA-2018:3768
https://access.redhat.com/security/cve/CVE-2018-1336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1336
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/156d76a6afeef440d14044a560d6ad1d029361c4
https://github.com/apache/tomcat/commit/92cd494555598e99dd691712e8ee426a2f9c2e93
https://github.com/apache/tomcat/commit/e00812b94e5830b2be3de04f4ae4ade38a700074
https://github.com/apache/tomcat80/commit/9e9b7fe1b5732277a26e437f1d32155de6208ef2
https://linux.oracle.com/cve/CVE-2018-1336.html
https://linux.oracle.com/errata/ELSA-2018-2921.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1336
https://security.netapp.com/advisory/ntap-20180817-0001
https://security.netapp.com/advisory/ntap-20180817-0001/
https://support.f5.com/csp/article/K73008537?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K73008537?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3723-1
https://usn.ubuntu.com/3723-1
https://usn.ubuntu.com/3723-1/
https://web.archive.org/web/20190703075545/http://www.securitytracker.com/id/1041375
https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104898
https://www.cve.org/CVERecord?id=CVE-2018-1336
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| tomcat-lib |
CVE-2020-13935 |
HIGH |
7.0.42-4.el7 |
7.0.76-15.el7 |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3C39e4200c-6f4e-b85d-fe4b-a9c2bd5fdc3d%40apache.org%3E
http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37
https://access.redhat.com/security/cve/CVE-2020-13935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/12d715676038efbf9c728af10163f8277fc019d5
https://github.com/apache/tomcat/commit/1c1c77b0efb667cea80b532440b44cea1dc427c3
https://github.com/apache/tomcat/commit/40fa74c74822711ab878079d0a69f7357926723d
https://github.com/apache/tomcat/commit/4c04982870d6e730c38e21e58fb653b7cf723784
https://github.com/apache/tomcat/commit/f9f75c14678b68633f79030ddf4ff827f014cc84
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-13935.html
https://linux.oracle.com/errata/ELSA-2020-4004.html
https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2020-13935
https://security.netapp.com/advisory/ntap-20200724-0003
https://security.netapp.com/advisory/ntap-20200724-0003/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4448-1
https://ubuntu.com/security/notices/USN-4596-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://usn.ubuntu.com/4596-1
https://usn.ubuntu.com/4596-1/
https://www.cve.org/CVERecord?id=CVE-2020-13935
https://www.debian.org/security/2020/dsa-4727
https://www.openwall.com/lists/oss-security/2020/07/14/3
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-lib |
CVE-2020-1938 |
HIGH |
7.0.42-4.el7 |
7.0.76-11.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html
http://support.blackberry.com/kb/articleDetail?articleNumber=000062739
https://access.redhat.com/security/cve/CVE-2020-1938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1938
https://linux.oracle.com/cve/CVE-2020-1938.html
https://linux.oracle.com/errata/ELSA-2020-0912.html
https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a%40%3Cusers.tomee.apache.org%3E
https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a@%3Cusers.tomee.apache.org%3E
https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7%40%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E
https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3@%3Ccommits.tomee.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B
https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/
https://nvd.nist.gov/vuln/detail/CVE-2020-1938
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20200226-0002
https://security.netapp.com/advisory/ntap-20200226-0002/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31
https://www.cnvd.org.cn/webinfo/show/5415
https://www.cve.org/CVERecord?id=CVE-2020-1938
https://www.debian.org/security/2020/dsa-4673
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487
|
| tomcat-lib |
CVE-2020-9484 |
HIGH |
7.0.42-4.el7 |
7.0.76-12.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202005.mbox/%3Ce3a0a517-bf82-ba62-0af6-24b83ea0e4e2%40apache.org%3E
http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html
http://seclists.org/fulldisclosure/2020/Jun/6
http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M5
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.104
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.55
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.35
http://www.openwall.com/lists/oss-security/2021/03/01/2
https://access.redhat.com/security/cve/CVE-2020-9484
https://bugzilla.suse.com/show_bug.cgi?id=1171928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222 (9.0.35)
https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222.patch
https://github.com/apache/tomcat/commit/4785433a226a20df6acbea49296e1ce7e23de453
https://github.com/apache/tomcat/commit/53e30390943c18fca0c9e57dbcc14f1c623cfd06 (7.0.104)
https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4
https://github.com/apache/tomcat/commit/74b105657ffbd1d1de80455f03446c3bbf30d1f5
https://github.com/apache/tomcat/commit/93f0cc403a9210d469afc2bd9cf03ab3251c6f35
https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b
https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b (10.0.0-M5)
https://github.com/apache/tomcat/commit/ec08af18d0f9ddca3f2d800ef66fe7fd20afef2f (8.5.55)
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-9484.html
https://linux.oracle.com/errata/ELSA-2020-2530.html
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/05/msg00020.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N
https://nvd.nist.gov/vuln/detail/CVE-2020-9484
https://security.gentoo.org/glsa/202006-21
https://security.netapp.com/advisory/ntap-20200528-0005
https://security.netapp.com/advisory/ntap-20200528-0005/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4448-1
https://ubuntu.com/security/notices/USN-4596-1
https://ubuntu.com/security/notices/USN-5360-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://usn.ubuntu.com/4596-1
https://usn.ubuntu.com/4596-1/
https://www.cve.org/CVERecord?id=CVE-2020-9484
https://www.debian.org/security/2020/dsa-4727
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-lib |
CVE-2023-34981 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-34981
https://bz.apache.org/bugzilla/show_bug.cgi?id=66512
https://bz.apache.org/bugzilla/show_bug.cgi?id=66591
https://github.com/advisories/GHSA-mppv-79ch-vw6q
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2214c8030522aa9b2a367dfa5d9acff1a03666ae
https://github.com/apache/tomcat/commit/2f0ca2378415f4cf0748f4bc8fa955f41f803fa5
https://github.com/apache/tomcat/commit/739c7381aed22b7636351caf885ddc519ab6b442
https://github.com/apache/tomcat/commit/f0742f47b98aca943097f7f88e0d1163f57527e3
https://lists.apache.org/thread/j1ksjh9m9gx1q60rtk1sbzmxhvj5h5qz
https://nvd.nist.gov/vuln/detail/CVE-2023-34981
https://security.netapp.com/advisory/ntap-20230714-0003
https://security.netapp.com/advisory/ntap-20230714-0003/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-34981
|
| tomcat-lib |
CVE-2023-46589 |
HIGH |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/11/28/2
https://access.redhat.com/errata/RHSA-2024:1134
https://access.redhat.com/security/cve/CVE-2023-46589
https://bugzilla.redhat.com/2252050
https://bugzilla.redhat.com/show_bug.cgi?id=2252050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46589
https://errata.almalinux.org/9/ALSA-2024-1134.html
https://errata.rockylinux.org/RLSA-2024:0539
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6f181e1062a472bc5f0234980f66cbde42c1041b
https://github.com/apache/tomcat/commit/7a2d8818fcea0b51747a67af9510ce7977245ebd
https://github.com/apache/tomcat/commit/aa92971e879a519384c517febc39fd04c48d4642
https://github.com/apache/tomcat/commit/b5776d769bffeade865061bc8ecbeb2b56167b08
https://linux.oracle.com/cve/CVE-2023-46589.html
https://linux.oracle.com/errata/ELSA-2024-1134.html
https://lists.apache.org/thread/0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr
https://lists.debian.org/debian-lts-announce/2024/01/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2023-46589
https://security.netapp.com/advisory/ntap-20231214-0009
https://security.netapp.com/advisory/ntap-20231214-0009/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-46589
https://www.openwall.com/lists/oss-security/2023/11/28/2
|
| tomcat-lib |
CVE-2024-23672 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-23672
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0052b374684b613b0c849899b325ebe334ac6501
https://github.com/apache/tomcat/commit/3631adb1342d8bbd8598802a12b63ad02c37d591
https://github.com/apache/tomcat/commit/52d6650e062d880704898d7d8c1b2b7a3efe8068
https://github.com/apache/tomcat/commit/b0e3b1bd78de270d53e319d7cb79eb282aa53cb9
https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f
https://nvd.nist.gov/vuln/detail/CVE-2024-23672
https://www.cve.org/CVERecord?id=CVE-2024-23672
|
| tomcat-lib |
CVE-2024-24549 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-24549
https://lists.apache.org/thread/4c50rmomhbbsdgfjsgwlb51xdwfjdcvg
https://nvd.nist.gov/vuln/detail/CVE-2024-24549
https://www.cve.org/CVERecord?id=CVE-2024-24549
|
| tomcat-lib |
CVE-2013-4286 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://advisories.mageia.org/MGASA-2014-0148.html
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2014-0343.html
http://rhn.redhat.com/errata/RHSA-2014-0344.html
http://rhn.redhat.com/errata/RHSA-2014-0345.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/57675
http://secunia.com/advisories/59036
http://secunia.com/advisories/59675
http://secunia.com/advisories/59722
http://secunia.com/advisories/59724
http://secunia.com/advisories/59733
http://secunia.com/advisories/59873
http://svn.apache.org/viewvc?view=revision&revision=1521829
http://svn.apache.org/viewvc?view=revision&revision=1521854
http://svn.apache.org/viewvc?view=revision&revision=1552565
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21667883
http://www-01.ibm.com/support/docview.wss?uid=swg21675886
http://www-01.ibm.com/support/docview.wss?uid=swg21677147
http://www-01.ibm.com/support/docview.wss?uid=swg21678113
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65773
http://www.ubuntu.com/usn/USN-2130-1
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2013-4286
https://bugzilla.redhat.com/show_bug.cgi?id=1069921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/41b90b6ebc3e7f898a5a87d197ddf63790d33315
https://github.com/apache/tomcat/commit/7c040003f1387795356605566be7870cf70e05dc
https://github.com/apache/tomcat/commit/bcce3e4997a4ed06fe03e2517443f3ad8ade2dfa
https://github.com/apache/tomcat/commit/d0b3e252eb168fafbfb4c3efc16d4192fc8fad6c
https://github.com/apache/tomcat80/commit/ff00954b78e6484e40f323c0cef2e6d95c2882b9
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2013-4286.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-4286
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://ubuntu.com/security/notices/USN-2130-1
https://web.archive.org/web/20140724174205/http://secunia.com/advisories/57675
https://web.archive.org/web/20140804172142/http://secunia.com/advisories/59036
https://web.archive.org/web/20141230041748/http://seclists.org/fulldisclosure/2014/Dec/23
https://web.archive.org/web/20160317145515/http://www.securityfocus.com/archive/1/534161/100/0/threaded
https://web.archive.org/web/20160729061926/http://www.securityfocus.com/bid/65773
https://web.archive.org/web/20161014054543/http://www-01.ibm.com/support/docview.wss?uid=swg21678231
https://web.archive.org/web/20161014054838/http://www-01.ibm.com/support/docview.wss?uid=swg21677147
https://web.archive.org/web/20161014054913/http://www-01.ibm.com/support/docview.wss?uid=swg21678113
https://web.archive.org/web/20161014054948/http://www-01.ibm.com/support/docview.wss?uid=swg21667883
https://web.archive.org/web/20161024215453/http://secunia.com/advisories/59873
https://web.archive.org/web/20161024215639/http://secunia.com/advisories/59722
https://web.archive.org/web/20161024215804/http://secunia.com/advisories/59675
https://web.archive.org/web/20161024220018/http://secunia.com/advisories/59724
https://web.archive.org/web/20161024220034/http://secunia.com/advisories/59733
https://www.cve.org/CVERecord?id=CVE-2013-4286
|
| tomcat-lib |
CVE-2013-4322 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://advisories.mageia.org/MGASA-2014-0148.html
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/59036
http://secunia.com/advisories/59675
http://secunia.com/advisories/59722
http://secunia.com/advisories/59724
http://secunia.com/advisories/59873
http://svn.apache.org/viewvc?view=revision&revision=1521834
http://svn.apache.org/viewvc?view=revision&revision=1521864
http://svn.apache.org/viewvc?view=revision&revision=1549522
http://svn.apache.org/viewvc?view=revision&revision=1549523
http://svn.apache.org/viewvc?view=revision&revision=1556540
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21667883
http://www-01.ibm.com/support/docview.wss?uid=swg21675886
http://www-01.ibm.com/support/docview.wss?uid=swg21677147
http://www-01.ibm.com/support/docview.wss?uid=swg21678113
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65767
http://www.ubuntu.com/usn/USN-2130-1
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2013-4322
https://bugzilla.redhat.com/show_bug.cgi?id=1069905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/70dc3b279f7c99136c2c51bce8812508b4893c8b
https://github.com/apache/tomcat/commit/72613a0e2f88af789c2acc7093c82ff02b95b6d1
https://github.com/apache/tomcat/commit/a91516b80deaf1d0c6e04a7931765fdac34c4ccd
https://github.com/apache/tomcat/commit/b8cb9f5f91e9210ca107fd80f3e6acd47531daa7
https://github.com/apache/tomcat/commit/bed3a1a0d06a3c787183c6e90f326bbe17e49dd4
https://github.com/apache/tomcat/commit/d6a9898125f34e593de426e8c7dabb0f224fc00f
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2013-4322.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-4322
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://ubuntu.com/security/notices/USN-2130-1
https://web.archive.org/web/20140315211337/http://www.securityfocus.com/bid/65767
https://web.archive.org/web/20150503090027/http://www.securityfocus.com/archive/1/534161/100/0/threaded
https://web.archive.org/web/20151023203543/http://secunia.com/advisories/59873
https://web.archive.org/web/20161024215620/http://secunia.com/advisories/59036
https://web.archive.org/web/20161024215639/http://secunia.com/advisories/59722
https://web.archive.org/web/20161024215804/http://secunia.com/advisories/59675
https://web.archive.org/web/20161024220018/http://secunia.com/advisories/59724
https://www.cve.org/CVERecord?id=CVE-2013-4322
|
| tomcat-lib |
CVE-2014-0075 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/59121
http://secunia.com/advisories/59616
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://secunia.com/advisories/60793
http://svn.apache.org/viewvc?view=revision&revision=1578337
http://svn.apache.org/viewvc?view=revision&revision=1578341
http://svn.apache.org/viewvc?view=revision&revision=1579262
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21680603
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.novell.com/support/kb/doc.php?id=7010166
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67671
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/b6974571c122f6a1e7ec74a90fa212976fa7b0ed
https://github.com/apache/tomcat/commit/f646a5acd5e32d6f5a2d9bf1d94ca66b65477675
https://github.com/apache/tomcat80/commit/d49a03728ac7e3c800b1b0ce0eeccd8a5a21bb91
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0075.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0075
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0075
|
| tomcat-lib |
CVE-2014-0099 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/138
http://seclists.org/fulldisclosure/2014/May/140
http://secunia.com/advisories/59121
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://secunia.com/advisories/60793
http://svn.apache.org/viewvc?view=revision&revision=1578812
http://svn.apache.org/viewvc?view=revision&revision=1578814
http://svn.apache.org/viewvc?view=revision&revision=1580473
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21680603
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.securityfocus.com/archive/1/532218/100/0/threaded
http://www.securityfocus.com/archive/1/532221/100/0/threaded
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67668
http://www.securitytracker.com/id/1030302
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/184cdc0d3f03f5737e12d21fff246d7285034597
https://github.com/apache/tomcat/commit/fffd63a3bd3a5475379b7c074820a5463b7663b3
https://github.com/apache/tomcat80/commit/990de53ab923c126f7402090a4ca53df4bb80cbd
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0099.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0099
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0099
|
| tomcat-lib |
CVE-2014-0227 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-2.el7_1 |
http://advisories.mageia.org/MGASA-2015-0081.html
http://archives.neohapsis.com/archives/bugtraq/2015-02/0067.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=143393515412274&w=2
http://marc.info/?l=bugtraq&m=143403519711434&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://rhn.redhat.com/errata/RHSA-2015-0983.html
http://rhn.redhat.com/errata/RHSA-2015-0991.html
http://svn.apache.org/viewvc?view=revision&revision=1600984
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/72717
http://www.securitytracker.com/id/1032791
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/security/cve/CVE-2014-0227
https://bugzilla.redhat.com/show_bug.cgi?id=1109196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227
https://linux.oracle.com/cve/CVE-2014-0227.html
https://linux.oracle.com/errata/ELSA-2015-0991.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0227
https://source.jboss.org/changelog/JBossWeb?cs=2455
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.43
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-0227
|
| tomcat-lib |
CVE-2014-7810 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2015-1621.html
http://rhn.redhat.com/errata/RHSA-2015-1622.html
http://rhn.redhat.com/errata/RHSA-2016-0492.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://svn.apache.org/viewvc?view=revision&revision=1644018
http://svn.apache.org/viewvc?view=revision&revision=1645642
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.44
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.59
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.17
http://www.debian.org/security/2015/dsa-3428
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/74665
http://www.securitytracker.com/id/1032330
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/security/cve/CVE-2014-7810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://linux.oracle.com/cve/CVE-2014-7810.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-7810
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-7810
|
| tomcat-lib |
CVE-2015-5351 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://packetstormsecurity.com/files/135882/Apache-Tomcat-CSRF-Token-Leak.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/148
http://svn.apache.org/viewvc?view=revision&revision=1720652
http://svn.apache.org/viewvc?view=revision&revision=1720655
http://svn.apache.org/viewvc?view=revision&revision=1720658
http://svn.apache.org/viewvc?view=revision&revision=1720660
http://svn.apache.org/viewvc?view=revision&revision=1720661
http://svn.apache.org/viewvc?view=revision&revision=1720663
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/83330
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5351
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351
https://github.com/apache/tomcat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5351.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5351
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://softwaresupport.hpe.com/document/-/facetsearch/document/KM02978021
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20161020161943/http://www.securityfocus.com/bid/83330
https://www.cve.org/CVERecord?id=CVE-2015-5351
|
| tomcat-lib |
CVE-2016-0714 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/145
http://svn.apache.org/viewvc?view=revision&revision=1725263
http://svn.apache.org/viewvc?view=revision&revision=1725914
http://svn.apache.org/viewvc?view=revision&revision=1726196
http://svn.apache.org/viewvc?view=revision&revision=1726203
http://svn.apache.org/viewvc?view=revision&revision=1726923
http://svn.apache.org/viewvc?view=revision&revision=1727034
http://svn.apache.org/viewvc?view=revision&revision=1727166
http://svn.apache.org/viewvc?view=revision&revision=1727182
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83327
http://www.securitytracker.com/id/1035069
http://www.securitytracker.com/id/1037640
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0714
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/50f1b1da794cd93b70ab5456d3c2c984408e1506
https://github.com/apache/tomcat/commit/79e8ad03404c131009811855f9a30d8d01c0c736
https://github.com/apache/tomcat/commit/824eb1d1ad922e7652ecf51adb2b9eebb5bb88b5
https://github.com/apache/tomcat/commit/e1b1002129fea4033329f6f619ba219527bbbd40
https://github.com/apache/tomcat/commit/f626da75fd59da82b14dee7b8cc46ad51eefdbe5
https://github.com/apache/tomcat/commit/ff1b659dc366a2ad47cd8f7e3544c796a1b15e46
https://github.com/apache/tomcat80/commit/2e5cc28052e84ba45196949ba602484221bbf33c
https://github.com/apache/tomcat80/commit/5430f30c79383e4d2d87785468905fcb00bace58
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2016-0714.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0714
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20170204045529/http://www.securityfocus.com/bid/83327
https://web.archive.org/web/20170601064840/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20170927131230/http://www.securitytracker.com/id/1037640
https://www.cve.org/CVERecord?id=CVE-2016-0714
|
| tomcat-lib |
CVE-2016-0763 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179356.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/147
http://svn.apache.org/viewvc?view=revision&revision=1725926
http://svn.apache.org/viewvc?view=revision&revision=1725929
http://svn.apache.org/viewvc?view=revision&revision=1725931
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/83326
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0763
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/76ebc9007567c8326217dd94844540e1e27d8468
https://github.com/apache/tomcat/commit/c08641da04d31f730b56b8675301e55db97dfe88
https://github.com/apache/tomcat80/commit/0531f7aeff1999d362e0a68512a3517f2cf1a6ae
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
https://linux.oracle.com/cve/CVE-2016-0763.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0763
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160314101138/http://www.securityfocus.com/bid/83326
https://web.archive.org/web/20160404202803/http://www.securitytracker.com/id/1035069
https://www.cve.org/CVERecord?id=CVE-2016-0763
|
| tomcat-lib |
CVE-2016-3092 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://jvn.jp/en/jp/JVN89379547/index.html
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E
http://markmail.org/message/oyxfv73jb2g7rjg3
http://rhn.redhat.com/errata/RHSA-2016-2068.html
http://rhn.redhat.com/errata/RHSA-2016-2069.html
http://rhn.redhat.com/errata/RHSA-2016-2070.html
http://rhn.redhat.com/errata/RHSA-2016-2071.html
http://rhn.redhat.com/errata/RHSA-2016-2072.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://svn.apache.org/viewvc?view=revision&revision=1743480
http://svn.apache.org/viewvc?view=revision&revision=1743722
http://svn.apache.org/viewvc?view=revision&revision=1743738
http://svn.apache.org/viewvc?view=revision&revision=1743742
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3609
http://www.debian.org/security/2016/dsa-3611
http://www.debian.org/security/2016/dsa-3614
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91453
http://www.securitytracker.com/id/1036427
http://www.securitytracker.com/id/1036900
http://www.securitytracker.com/id/1037029
http://www.securitytracker.com/id/1039606
http://www.ubuntu.com/usn/USN-3024-1
http://www.ubuntu.com/usn/USN-3027-1
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/security/cve/CVE-2016-3092
https://bugzilla.redhat.com/show_bug.cgi?id=1349468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092
https://github.com/advisories/GHSA-fvm3-cfvj-gxqq
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759
https://linux.oracle.com/cve/CVE-2016-3092.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-3092
https://security.gentoo.org/glsa/201705-09
https://security.gentoo.org/glsa/202107-39
https://security.netapp.com/advisory/ntap-20190212-0001
https://security.netapp.com/advisory/ntap-20190212-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://ubuntu.com/security/notices/USN-3027-1
https://web.archive.org/web/20160726114129/http://www.securitytracker.com/id/1036427
https://web.archive.org/web/20160924080828/http://www.securityfocus.com/bid/91453
https://web.archive.org/web/20170317103106/http://www.securitytracker.com/id/1037029
https://web.archive.org/web/20171103224941/http://www.securitytracker.com/id/1036900
https://web.archive.org/web/20171111060434/http://www.securitytracker.com/id/1039606
https://www.cve.org/CVERecord?id=CVE-2016-3092
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| tomcat-lib |
CVE-2016-5388 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
http://rhn.redhat.com/errata/RHSA-2016-1624.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/91818
http://www.securitytracker.com/id/1036331
https://access.redhat.com/errata/RHSA-2016:1624
https://access.redhat.com/errata/RHSA-2016:1635
https://access.redhat.com/errata/RHSA-2016:1636
https://access.redhat.com/errata/RHSA-2016:2045
https://access.redhat.com/errata/RHSA-2016:2046
https://access.redhat.com/security/cve/CVE-2016-5388
https://bugzilla.redhat.com/show_bug.cgi?id=1353809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/1b91e91194a095ea922f96d1dccddf6fbc446e54
https://github.com/apache/tomcat/commit/880250877b0643956435282afb9c111450cfff4c
https://github.com/apache/tomcat/commit/fb3569fbb9a2f55459aa8e1e22bc35a737e66329
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5388.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5388
https://rhn.redhat.com/errata/RHSA-2016-1624.html
https://rhn.redhat.com/errata/RHSA-2016-2045.html
https://rhn.redhat.com/errata/RHSA-2016-2046.html
https://tomcat.apache.org/tomcat-7.0-doc/changelog.html
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4791-1
https://www.apache.org/security/asf-httpoxy-response.txt
https://www.cve.org/CVERecord?id=CVE-2016-5388
https://www.kb.cert.org/vuls/id/797896
|
| tomcat-lib |
CVE-2016-6816 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-11.el7_3 |
http://rhn.redhat.com/errata/RHSA-2017-0244.html
http://rhn.redhat.com/errata/RHSA-2017-0245.html
http://rhn.redhat.com/errata/RHSA-2017-0246.html
http://rhn.redhat.com/errata/RHSA-2017-0247.html
http://rhn.redhat.com/errata/RHSA-2017-0250.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-0527.html
http://www.debian.org/security/2016/dsa-3738
http://www.openwall.com/lists/oss-security/2016/11/22/17
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/94461
http://www.securitytracker.com/id/1037332
https://access.redhat.com/articles/2991951
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:0935
https://access.redhat.com/security/cve/CVE-2016-6816
https://access.redhat.com/solutions/2891171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816
https://github.com/apache/tomcat/commit/516bda676ac8d0284da3e0295a7df70391315360
https://github.com/apache/tomcat/commit/cdc0a935c2173aff60039a0b85e57a461381107c
https://github.com/apache/tomcat/commit/f96f5751d418ae5a2f550be040daf9c5f7d99256
https://github.com/apache/tomcat80/commit/779d5d34e68e50d2f721897050b147106992f566
https://linux.oracle.com/cve/CVE-2016-6816.html
https://linux.oracle.com/errata/ELSA-2017-0935.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6816
https://security.netapp.com/advisory/ntap-20180607-0001
https://security.netapp.com/advisory/ntap-20180607-0001/
https://svn.apache.org/viewvc?view=revision&revision=1767641
https://svn.apache.org/viewvc?view=revision&revision=1767645
https://svn.apache.org/viewvc?view=revision&revision=1767653
https://svn.apache.org/viewvc?view=revision&revision=1767675
https://svn.apache.org/viewvc?view=revision&revision=1767683
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161204121236/http://www.securityfocus.com/bid/94461
https://web.archive.org/web/20170929085438/http://www.securitytracker.com/id/1037332
https://www.cve.org/CVERecord?id=CVE-2016-6816
https://www.exploit-db.com/exploits/41783
https://www.exploit-db.com/exploits/41783/
|
| tomcat-lib |
CVE-2017-12616 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.securityfocus.com/bid/100897
http://www.securitytracker.com/id/1039393
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/security/cve/CVE-2017-12616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12616
https://github.com/apache/tomcat
https://lists.apache.org/thread.html/1df9b4552464caa42047062fe7175da0da06c18ecc8daf99258bbda6%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1df9b4552464caa42047062fe7175da0da06c18ecc8daf99258bbda6@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2017-12616
https://security.netapp.com/advisory/ntap-20171018-0001
https://security.netapp.com/advisory/ntap-20171018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://www.cve.org/CVERecord?id=CVE-2017-12616
https://www.synology.com/support/security/Synology_SA_17_54_Tomcat
|
| tomcat-lib |
CVE-2017-5648 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-12.el7_3 |
http://www.debian.org/security/2017/dsa-3842
http://www.debian.org/security/2017/dsa-3843
http://www.openwall.com/lists/oss-security/2017/04/10/23
http://www.openwall.com/lists/oss-security/2020/07/20/8
http://www.securityfocus.com/bid/97530
http://www.securitytracker.com/id/1038220
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:1809
https://access.redhat.com/security/cve/CVE-2017-5648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5648
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0f7b9465d594b9814e1853d1e3a6e3aa51a21610
https://github.com/apache/tomcat/commit/6bb36dfdf6444efda074893dff493b9eb3648808
https://github.com/apache/tomcat/commit/dfa40863421d7681fed893b4256666491887e38c
https://github.com/apache/tomcat80/commit/6d73b079c55ee25dea1bbd0556bb568a4247dacd
https://linux.oracle.com/cve/CVE-2017-5648.html
https://linux.oracle.com/errata/ELSA-2017-1809.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5648
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180614-0001
https://security.netapp.com/advisory/ntap-20180614-0001/
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170417124117/http://www.securityfocus.com/bid/97530
https://web.archive.org/web/20170420115120/http://www.securitytracker.com/id/1038220
https://www.cve.org/CVERecord?id=CVE-2017-5648
|
| tomcat-lib |
CVE-2017-7674 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.debian.org/security/2017/dsa-3974
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/100280
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/security/cve/CVE-2017-7674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7674
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/52382ebfbce20a98b01cd9d37184a12703987a5a
https://github.com/apache/tomcat/commit/9044c1672bbe4b2cf4c55028cc8b977cc62650e7
https://github.com/apache/tomcat/commit/b94478d45b7e1fc06134a785571f78772fa30fed
https://github.com/apache/tomcat80/commit/f52c242d92d4563dd1226dcc993ec37370ba9ce3
https://linux.oracle.com/cve/CVE-2017-7674.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/22b4bb077502f847e2b9fcf00b96e81e734466ab459780ff73b60c0f%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/22b4bb077502f847e2b9fcf00b96e81e734466ab459780ff73b60c0f@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread/bol4f8wyjfsbo135tw9gy49o5nf8qpth
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7674
https://security.netapp.com/advisory/ntap-20180614-0003
https://security.netapp.com/advisory/ntap-20180614-0003/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://svn.apache.org/viewvc?view=revision&revision=1795816
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20171115015045/http://www.securityfocus.com/bid/100280
https://web.archive.org/web/20210116171055/http://www.securityfocus.com/bid/100280
https://www.cve.org/CVERecord?id=CVE-2017-7674
|
| tomcat-lib |
CVE-2018-11784 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.91
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.34
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.12
http://www.securityfocus.com/bid/105524
https://access.redhat.com/errata/RHSA-2019:0130
https://access.redhat.com/errata/RHSA-2019:0131
https://access.redhat.com/errata/RHSA-2019:0485
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/security/cve/CVE-2018-11784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11784
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/advisories/GHSA-5q99-f34m-67gc
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/b76e1dfb3dec3789cc700f8d022c872eb947a221
https://github.com/apache/tomcat/commit/efb860b3ff8ebcf606199b8d0d432f76898040da
https://github.com/apache/tomcat/commit/f9f147359b7c95511b64cd99bbc47917c01b3879
https://kc.mcafee.com/corporate/index?page=content&id=SB10284
https://linux.oracle.com/cve/CVE-2018-11784.html
https://linux.oracle.com/errata/ELSA-2019-1529.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP
https://nvd.nist.gov/vuln/detail/CVE-2018-11784
https://seclists.org/bugtraq/2019/Dec/43
https://security.netapp.com/advisory/ntap-20181014-0002
https://security.netapp.com/advisory/ntap-20181014-0002/
https://ubuntu.com/security/notices/USN-3787-1
https://usn.ubuntu.com/3787-1
https://usn.ubuntu.com/3787-1/
https://web.archive.org/web/20200227030058/http://www.securityfocus.com/bid/105524
https://www.cve.org/CVERecord?id=CVE-2018-11784
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat-lib |
CVE-2018-1304 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103170
http://www.securitytracker.com/id/1040427
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:1320
https://access.redhat.com/errata/RHSA-2018:1447
https://access.redhat.com/errata/RHSA-2018:1448
https://access.redhat.com/errata/RHSA-2018:1449
https://access.redhat.com/errata/RHSA-2018:1450
https://access.redhat.com/errata/RHSA-2018:1451
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-1304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1304
https://github.com/advisories/GHSA-6rxj-58jh-436r
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2d69fde135302e8cff984bb2131ec69f2e396964
https://github.com/apache/tomcat/commit/5af7c13cff7cc8366c5997418e820989fabb8f48
https://github.com/apache/tomcat/commit/723ea6a5bc5e7bc49e5ef84273c3b3c164a6a4fd
https://github.com/apache/tomcat80/commit/9e700b93e3bf5c605267d20568a964169f9e0b79
https://linux.oracle.com/cve/CVE-2018-1304.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1304
https://security.netapp.com/advisory/ntap-20180706-0001
https://security.netapp.com/advisory/ntap-20180706-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20200227102806/http://www.securityfocus.com/bid/103170
https://web.archive.org/web/20200516074457/http://www.securitytracker.com/id/1040427
https://www.cve.org/CVERecord?id=CVE-2018-1304
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-lib |
CVE-2018-1305 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103144
http://www.securitytracker.com/id/1040428
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:1320
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-1305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1305
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2349801827f09fb6582a8afdeca704294106ad9a
https://github.com/apache/tomcat/commit/2aac69f694d42d9219eb27018b3da0ae1bdd73ab
https://github.com/apache/tomcat/commit/3e54b2a6314eda11617ff7a7b899c251e222b1a1
https://github.com/apache/tomcat/commit/4d637bc3986e5d09b9363e2144b8ba74fa6eac3a
https://github.com/apache/tomcat/commit/c63b96d72cd39287e17b2ba698f4eee0ba508073
https://github.com/apache/tomcat/commit/de6b4fd58b64828f374503b9ec76a12017b92895
https://linux.oracle.com/cve/CVE-2018-1305.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1305
https://security.netapp.com/advisory/ntap-20180706-0001
https://security.netapp.com/advisory/ntap-20180706-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20200227030042/http://www.securityfocus.com/bid/103144
https://web.archive.org/web/20200516094320/http://www.securitytracker.com/id/1040428
https://www.cve.org/CVERecord?id=CVE-2018-1305
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-lib |
CVE-2018-8014 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.89
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.53
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.32
http://tomcat.apache.org/security-9.html
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.9
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104203
http://www.securitytracker.com/id/1040998
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:2469
https://access.redhat.com/errata/RHSA-2018:2470
https://access.redhat.com/errata/RHSA-2018:3768
https://access.redhat.com/errata/RHSA-2019:0450
https://access.redhat.com/errata/RHSA-2019:0451
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-8014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8014
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/advisories/GHSA-r4x2-3cq5-hqvp
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/5877390a9605f56d9bd6859a54ccbfb16374a78b
https://github.com/apache/tomcat/commit/60f596a21fd6041335a3a1a4015d4512439cecb5
https://github.com/apache/tomcat/commit/d83a76732e6804739b81d8b2056365307637b42d
https://github.com/apache/tomcat80/commit/2c9d8433bd3247a2856d4b2555447108758e813e
https://linux.oracle.com/cve/CVE-2018-8014.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://nvd.nist.gov/vuln/detail/CVE-2018-8014
https://seclists.org/bugtraq/2019/Dec/43
https://security.netapp.com/advisory/ntap-20181018-0002
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20181017143233/http://www.securityfocus.com/bid/104203
https://web.archive.org/web/20201207080723/http://www.securitytracker.com/id/1041888
https://web.archive.org/web/20201207101131/http://www.securitytracker.com/id/1040998
https://www.cve.org/CVERecord?id=CVE-2018-8014
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| tomcat-lib |
CVE-2022-23181 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-23181
https://github.com/apache/tomcat
https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9
https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23181
https://security.netapp.com/advisory/ntap-20220217-0010
https://security.netapp.com/advisory/ntap-20220217-0010/
https://www.cve.org/CVERecord?id=CVE-2022-23181
https://www.debian.org/security/2022/dsa-5265
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
|
| tomcat-lib |
CVE-2023-24998 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/05/22/1
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-24998
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://commons.apache.org/proper/commons-fileupload/security-reports.html
https://commons.apache.org/proper/commons-fileupload/security-reports.html#Fixed_in_Apache_Commons_FileUpload_1.5
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/commons-fileupload
https://github.com/apache/commons-fileupload/commit/e20c04990f7420ca917e96a84cec58b13a1b3d17
https://github.com/apache/tomcat/commit/8a2285f13affa961cc65595aad999db5efae45ce
https://github.com/apache/tomcat/commit/9ca96c8c1eba86c0aaa2e6be581ba2a7d4d4ae6e
https://github.com/apache/tomcat/commit/cf77cc545de0488fb89e24294151504a7432df74
https://github.com/apache/tomcat/commit/d53d8e7f77042cc32a3b98f589496a1ef5088e38
https://linux.oracle.com/cve/CVE-2023-24998.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-24998
https://security.gentoo.org/glsa/202305-37
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-24998
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-lib |
CVE-2023-28708 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-28708
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://bz.apache.org/bugzilla/show_bug.cgi?id=66471
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3b51230764da595bb19e8d0962dd8c69ab40dfab
https://github.com/apache/tomcat/commit/5b72c94e8b2c4ada63a1d91dc527bf4d8fd1f510
https://github.com/apache/tomcat/commit/c64d496dda1560b5df113be55fbfaefec349b50f
https://github.com/apache/tomcat/commit/f509bbf31fc00abe3d9f25ebfabca5e05173da5b
https://linux.oracle.com/cve/CVE-2023-28708.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/hdksc59z3s7tm39x0pp33mtwdrt8qr67
https://nvd.nist.gov/vuln/detail/CVE-2023-28708
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-28708
|
| tomcat-lib |
CVE-2023-28709 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/05/22/1
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-28709
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-28709.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j
https://nvd.nist.gov/vuln/detail/CVE-2023-28709
https://security.gentoo.org/glsa/202305-37
https://security.netapp.com/advisory/ntap-20230616-0004
https://security.netapp.com/advisory/ntap-20230616-0004/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-28709
https://www.debian.org/security/2023/dsa-5521
|
| tomcat-lib |
CVE-2023-41080 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-41080
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/4998ad745b67edeadefe541c94ed029b53933d3b
https://github.com/apache/tomcat/commit/77c0ce2d169efa248b64b992e547aad549ec906b
https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27
https://github.com/apache/tomcat/commit/e3703c9abb8fe0d5602f6ba8a8f11d4b6940815a
https://linux.oracle.com/cve/CVE-2023-41080.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-41080
https://security.netapp.com/advisory/ntap-20230921-0006
https://security.netapp.com/advisory/ntap-20230921-0006/
https://www.cve.org/CVERecord?id=CVE-2023-41080
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-lib |
CVE-2023-42794 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/8
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-42794
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-42794.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/vvbr2ms7lockj1hlhz5q3wmxb2mwcw82
https://nvd.nist.gov/vuln/detail/CVE-2023-42794
https://www.cve.org/CVERecord?id=CVE-2023-42794
|
| tomcat-lib |
CVE-2023-42795 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/9
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-42795
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-42795.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/065jfyo583490r9j2v73nhpyxdob56lw
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-42795
https://security.netapp.com/advisory/ntap-20231103-0007
https://security.netapp.com/advisory/ntap-20231103-0007/
https://www.cve.org/CVERecord?id=CVE-2023-42795
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-lib |
CVE-2023-45648 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/10
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-45648
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/59583245639d8c42ae0009f4a4a70464d3ea70a0
https://github.com/apache/tomcat/commit/8ecff306507be8e4fd3adee1ae5de1ea6661a8f4
https://github.com/apache/tomcat/commit/eb5c094e5560764cda436362254997511a3ca1f6
https://linux.oracle.com/cve/CVE-2023-45648.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdp
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-45648
https://security.netapp.com/advisory/ntap-20231103-0007
https://security.netapp.com/advisory/ntap-20231103-0007/
https://www.cve.org/CVERecord?id=CVE-2023-45648
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-lib |
CVE-2014-0096 |
LOW |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/135
http://secunia.com/advisories/59121
http://secunia.com/advisories/59616
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://svn.apache.org/viewvc?view=revision&revision=1578610
http://svn.apache.org/viewvc?view=revision&revision=1578611
http://svn.apache.org/viewvc?view=revision&revision=1578637
http://svn.apache.org/viewvc?view=revision&revision=1578655
http://svn.apache.org/viewvc?view=revision&revision=1585853
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.novell.com/support/kb/doc.php?id=7010166
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67667
http://www.securitytracker.com/id/1030301
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3c53c4da7bcf300f519eaed5ad1751d24dd59f6b
https://github.com/apache/tomcat/commit/5c545da226b3c71ed9603c38ad2de88057778c1b
https://github.com/apache/tomcat/commit/913d94b289e056107e521dbab8e79cc72a62a331
https://github.com/apache/tomcat/commit/970c23bfd24dfa1dcb86ed917e6c8b47dcfb4433
https://github.com/apache/tomcat80/commit/65ed69d96a101dfa99eea2cfe17e9e87b310084c
https://github.com/apache/tomcat80/commit/f3f2979df693a9c84c6742fcb162f3671b0a50d3
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0096.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0096
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0096
|
| tomcat-lib |
CVE-2014-0119 |
LOW |
7.0.42-4.el7 |
7.0.42-8.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/141
http://secunia.com/advisories/59732
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://svn.apache.org/viewvc?view=revision&revision=1588193
http://svn.apache.org/viewvc?view=revision&revision=1588199
http://svn.apache.org/viewvc?view=revision&revision=1589640
http://svn.apache.org/viewvc?view=revision&revision=1589837
http://svn.apache.org/viewvc?view=revision&revision=1589980
http://svn.apache.org/viewvc?view=revision&revision=1589983
http://svn.apache.org/viewvc?view=revision&revision=1589985
http://svn.apache.org/viewvc?view=revision&revision=1589990
http://svn.apache.org/viewvc?view=revision&revision=1589992
http://svn.apache.org/viewvc?view=revision&revision=1589997
http://svn.apache.org/viewvc?view=revision&revision=1590028
http://svn.apache.org/viewvc?view=revision&revision=1590036
http://svn.apache.org/viewvc?view=revision&revision=1593815
http://svn.apache.org/viewvc?view=revision&revision=1593821
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67669
http://www.securitytracker.com/id/1030298
http://www.ubuntu.com/usn/USN-2654-1
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/080878ea519d8c74c53721a9ebf7be6fcf6f1f2f
https://github.com/apache/tomcat/commit/50311bed8d87e452ff0e69838ba312c4fe899b2d
https://github.com/apache/tomcat/commit/5517c5517e8a7ddb994504f0c5c05001a376b10c
https://github.com/apache/tomcat/commit/5aae1323c31d643afa9f2db80713b8e97b5123af
https://github.com/apache/tomcat/commit/6246d8307fb5f2b4ff0b0f4d6d1b0250dff01a81
https://github.com/apache/tomcat/commit/769477b9bc8442db3f571385fa0c3e206242cbf1
https://github.com/apache/tomcat/commit/934f884f330dad192d2c5dc950e28f4cd281461b
https://github.com/apache/tomcat/commit/ad3b34a290a0255d2a4c356a3611ab41ed9d04f5
https://github.com/apache/tomcat/commit/ce70ee6b8fe437a498a375215011056702b0c481
https://github.com/apache/tomcat/commit/ebe5c16f18ce1559e8462a94b3876a98525980d2
https://github.com/apache/tomcat/commit/f8b316acbbf9fabf87cc137e9777e912eda0d834
https://github.com/apache/tomcat80/commit/25251de791a6a7be13f2f3d3a66119a77025272d
https://github.com/apache/tomcat80/commit/4d90e355dc5ced4c53585c2b4700f71a52d8f447
https://github.com/apache/tomcat80/commit/51e59532ad4c604f55575963dc7a7f0250cb420f
https://github.com/apache/tomcat80/commit/69a8a72283c3395ece8b899cf8562e126de97a27
https://github.com/apache/tomcat80/commit/77e014cef5d5af619bcf77eaebf22c284d420802
https://github.com/apache/tomcat80/commit/7d33457de5fc5a652a88fb9bbc9ba4cbbda58f04
https://github.com/apache/tomcat80/commit/d59fd4398c8ae6361e0b13c491f66b51e49a7441
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0119.html
https://linux.oracle.com/errata/ELSA-2014-1038.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0119
https://ubuntu.com/security/notices/USN-2654-1
https://www.cve.org/CVERecord?id=CVE-2014-0119
|
| tomcat-lib |
CVE-2014-0230 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://mail-archives.apache.org/mod_mbox/tomcat-announce/201505.mbox/%3C554949D1.8030904%40apache.org%3E
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://openwall.com/lists/oss-security/2015/04/10/1
http://rhn.redhat.com/errata/RHSA-2015-1621.html
http://rhn.redhat.com/errata/RHSA-2015-1622.html
http://rhn.redhat.com/errata/RHSA-2015-2661.html
http://rhn.redhat.com/errata/RHSA-2016-0595.html
http://rhn.redhat.com/errata/RHSA-2016-0596.html
http://rhn.redhat.com/errata/RHSA-2016-0597.html
http://rhn.redhat.com/errata/RHSA-2016-0598.html
http://rhn.redhat.com/errata/RHSA-2016-0599.html
http://svn.apache.org/viewvc?view=revision&revision=1603770
http://svn.apache.org/viewvc?view=revision&revision=1603775
http://svn.apache.org/viewvc?view=revision&revision=1603779
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.44
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.9
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/74475
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/errata/RHSA-2015:2659
https://access.redhat.com/errata/RHSA-2015:2660
https://access.redhat.com/security/cve/CVE-2014-0230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0230
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6b2cfacf749be186ea77249a979af1d4863e47ba
https://github.com/apache/tomcat/commit/812088583d0e60717a8fe9c6d14e12bcdc3e6c51
https://github.com/apache/tomcat/commit/b1c8477e3e3ee635d19cc4d5987c2b157431e0c1
https://github.com/apache/tomcat/commit/c1357e649641844109711d60cacb98e4b5fcd3cb
https://github.com/apache/tomcat/commit/e28dd578fad90a6d5726ec34f3245c9f99d909a5
https://github.com/apache/tomcat/commit/e3146f4b03a2386c3e57597e86134d4ed5c31303
https://github.com/apache/tomcat/commit/fc049912464f0dcf9dede3761f38049369057e16
https://github.com/apache/tomcat/commit/fdd9f11dc24b95e5425076abb58e968336f320a2
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://issues.jboss.org/browse/JWS-219
https://issues.jboss.org/browse/JWS-220
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0230
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-0230
|
| tomcat-lib |
CVE-2015-5174 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://packetstormsecurity.com/files/135883/Apache-Tomcat-Limited-Directory-Traversal.html
http://rhn.redhat.com/errata/RHSA-2016-1435.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://seclists.org/bugtraq/2016/Feb/149
http://svn.apache.org/viewvc?view=revision&revision=1696281
http://svn.apache.org/viewvc?view=revision&revision=1696284
http://svn.apache.org/viewvc?view=revision&revision=1700897
http://svn.apache.org/viewvc?view=revision&revision=1700898
http://svn.apache.org/viewvc?view=revision&revision=1700900
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83329
http://www.securitytracker.com/id/1035070
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1432
https://access.redhat.com/errata/RHSA-2016:1433
https://access.redhat.com/errata/RHSA-2016:1434
https://access.redhat.com/security/cve/CVE-2015-5174
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5174.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r0b24f2c7507f702348e2c2d64e8a5de72bad6173658e8d8e45322ac2%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r0b24f2c7507f702348e2c2d64e8a5de72bad6173658e8d8e45322ac2@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd4863c79bf729aabb95571fd845a9ea4ee3ae3fcee48f35aba007350%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd4863c79bf729aabb95571fd845a9ea4ee3ae3fcee48f35aba007350@%3Cusers.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5174
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://www.cve.org/CVERecord?id=CVE-2015-5174
|
| tomcat-lib |
CVE-2015-5345 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://packetstormsecurity.com/files/135892/Apache-Tomcat-Directory-Disclosure.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://seclists.org/bugtraq/2016/Feb/146
http://seclists.org/fulldisclosure/2016/Feb/122
http://svn.apache.org/viewvc?view=revision&revision=1715206
http://svn.apache.org/viewvc?view=revision&revision=1715207
http://svn.apache.org/viewvc?view=revision&revision=1715213
http://svn.apache.org/viewvc?view=revision&revision=1715216
http://svn.apache.org/viewvc?view=revision&revision=1716882
http://svn.apache.org/viewvc?view=revision&revision=1716894
http://svn.apache.org/viewvc?view=revision&revision=1717209
http://svn.apache.org/viewvc?view=revision&revision=1717212
http://svn.apache.org/viewvc?view=revision&revision=1717216
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.qcsec.com/blog/CVE-2015-5345-apache-tomcat-vulnerability.html
http://www.securityfocus.com/bid/83328
http://www.securitytracker.com/id/1035071
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5345
https://bto.bluecoat.com/security-advisory/sa118
https://bz.apache.org/bugzilla/show_bug.cgi?id=58765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/127d8ea86d245846f0472865f0eb1eb111955e71
https://github.com/apache/tomcat/commit/58c09b6217c546e1a251a82da227018f05277228
https://github.com/apache/tomcat/commit/66daa4adc14b3e939659879153c0a579fdfcb099
https://github.com/apache/tomcat/commit/7288bc70a14edcfeff0a96e333a858be374cfc64
https://github.com/apache/tomcat/commit/816552abf6735fa37dfd37c8a7bfbdbd045477e0
https://github.com/apache/tomcat/commit/8437193708e4bf6b2861a7953dc472f9dad49111
https://github.com/apache/tomcat/commit/89cd0cf33a99dbbcf5c69050a83b6876e39269d7
https://github.com/apache/tomcat/commit/a273b5f45cb46a273d06510a689fc314155a952d
https://github.com/apache/tomcat/commit/c584c7c4ab0686e4125eefcd0afb32fb8269da3d
https://github.com/apache/tomcat80/commit/2b643a4e36d318d55ec57fee57610671656d23c0
https://github.com/apache/tomcat80/commit/c15c2aba8eb42425f9ebcfcaef579dada38ad3a2
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://kc.mcafee.com/corporate/index?page=content&id=SB10156
https://linux.oracle.com/cve/CVE-2015-5345.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5345
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321235514/http://www.securitytracker.com/id/1035071
https://web.archive.org/web/20160804024910/http://www.securityfocus.com/bid/83328
https://www.cve.org/CVERecord?id=CVE-2015-5345
|
| tomcat-lib |
CVE-2015-5346 |
LOW |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://packetstormsecurity.com/files/135890/Apache-Tomcat-Session-Fixation.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/143
http://svn.apache.org/viewvc?view=revision&revision=1713184
http://svn.apache.org/viewvc?view=revision&revision=1713185
http://svn.apache.org/viewvc?view=revision&revision=1713187
http://svn.apache.org/viewvc?view=revision&revision=1723414
http://svn.apache.org/viewvc?view=revision&revision=1723506
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83323
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5346
https://bto.bluecoat.com/security-advisory/sa118
https://bz.apache.org/bugzilla/show_bug.cgi?id=58809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/04164c1f01b973e548d95511d417f414ca723cb8
https://github.com/apache/tomcat/commit/6287be37d8d06c320215c45f7e2b8380411692e0
https://github.com/apache/tomcat/commit/83679b99cd40caa401d173c8f8e72fc98eb5d5be
https://github.com/apache/tomcat80/commit/41fbee7ba15435a831f765597ff907c56ebf2169
https://github.com/apache/tomcat80/commit/c39b7ffc2145644f7f3cf9e3cd4aada5048e56a0
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5346.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5346
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20160912063818/http://www.securityfocus.com/bid/83323
https://www.cve.org/CVERecord?id=CVE-2015-5346
|
| tomcat-lib |
CVE-2016-0706 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/144
http://svn.apache.org/viewvc?view=revision&revision=1722799
http://svn.apache.org/viewvc?view=revision&revision=1722800
http://svn.apache.org/viewvc?view=revision&revision=1722801
http://svn.apache.org/viewvc?view=revision&revision=1722802
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83324
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0706
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706
https://github.com/apache/tomcat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2016-0706.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0706
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160226210040/http://www.securityfocus.com/bid/83324
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://www.cve.org/CVERecord?id=CVE-2016-0706
|
| tomcat-lib |
CVE-2016-0762 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/pzuk6hauzljnm4r7?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93939
http://www.securitytracker.com/id/1037144
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-0762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0762
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/86b2e436099cb48f30dad950175c5beeeb763756
https://github.com/apache/tomcat/commit/970e615c7ade6ec6c341470bbc76aa1256353737
https://github.com/apache/tomcat/commit/d79c63d424fe6b225678416343b9ce106dec947c
https://github.com/apache/tomcat80/commit/dc4c3317452f0bc2c5e1f6a08d3bd9f22488b450
https://linux.oracle.com/cve/CVE-2016-0762.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/1872f96bad43647832bdd84a408794cd06d9cbb557af63085ca10009%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1872f96bad43647832bdd84a408794cd06d9cbb557af63085ca10009@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0762
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://www.cve.org/CVERecord?id=CVE-2016-0762
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-lib |
CVE-2016-5018 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/lixw6iyojoxwfizv?q=list:org.apache.tomcat.announce/
http://packetstormsecurity.com/files/155873/Tomcat-9.0.0.M1-Sandbox-Escape.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-1551.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93942
http://www.securitytracker.com/id/1037142
http://www.securitytracker.com/id/1038757
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:1548
https://access.redhat.com/errata/RHSA-2017:1549
https://access.redhat.com/errata/RHSA-2017:1550
https://access.redhat.com/errata/RHSA-2017:1552
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-5018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5018
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/648122fef84d3b43223e0b5ae668f84719dada0a
https://github.com/apache/tomcat/commit/890a2f681ed2f3461b27983d7da9737375ff2ae4
https://github.com/apache/tomcat/commit/a6b1ebc246b91b854237e5aad3dfd2b5460ea282
https://linux.oracle.com/cve/CVE-2016-5018.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9b3a63a20c87179815fdea14f6766853bafe79a0042dc0b4aa878a9e%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9b3a63a20c87179815fdea14f6766853bafe79a0042dc0b4aa878a9e@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-5018
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161125134649/http://www.securityfocus.com/bid/93942
https://web.archive.org/web/20170908024318/http://www.securitytracker.com/id/1037142
https://web.archive.org/web/20171012232225/http://www.securitytracker.com/id/1038757
https://www.cve.org/CVERecord?id=CVE-2016-5018
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-lib |
CVE-2016-6325 |
LOW |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93478
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/security/cve/CVE-2016-6325
https://bugzilla.redhat.com/show_bug.cgi?id=1367447
https://linux.oracle.com/cve/CVE-2016-6325.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6325
https://www.cve.org/CVERecord?id=CVE-2016-6325
|
| tomcat-lib |
CVE-2016-6794 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/zk7w6yly5mviocci?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93943
http://www.securitytracker.com/id/1037143
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6794
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0b41766456b1980e4f809e13ad6dc9fa912bae7e
https://github.com/apache/tomcat/commit/c1660182010b4255c21c874d69c124370a67784a
https://github.com/apache/tomcat/commit/f8db078f1e6e8b225f8344e63595113ca34cd408
https://github.com/apache/tomcat80/commit/ae6163a4f230bc679abfc93e048ff92996badad6
https://linux.oracle.com/cve/CVE-2016-6794.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/09d2f2c65ac4ff5da42f15dc2b0f78b655e50f1a42e8a9784134a9eb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/09d2f2c65ac4ff5da42f15dc2b0f78b655e50f1a42e8a9784134a9eb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6794
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20170317100547/http://www.securitytracker.com/id/1037143
https://web.archive.org/web/20170626130744/http://www.securityfocus.com/bid/93943
https://www.cve.org/CVERecord?id=CVE-2016-6794
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-lib |
CVE-2016-6796 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/hynaeawxxhpvvctu?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-1551.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93944
http://www.securitytracker.com/id/1037141
http://www.securitytracker.com/id/1038757
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:1548
https://access.redhat.com/errata/RHSA-2017:1549
https://access.redhat.com/errata/RHSA-2017:1550
https://access.redhat.com/errata/RHSA-2017:1552
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/f603f2f4595073f9490e01699d2083112a7c09a7
https://github.com/apache/tomcat/commit/f97769f50ee2613e1bf27107a01d48907fd993ac
https://github.com/apache/tomcat/commit/ffa0346fba2946401630291b642f1cff66d6a2be
https://github.com/apache/tomcat80/commit/d98fa92b9dfc90fe1ffdaa3cce1be3be84532260
https://linux.oracle.com/cve/CVE-2016-6796.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5a2105a56b2495ab70fa568f06925bd861f0d71ffab4fb38bb4fdc45%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5a2105a56b2495ab70fa568f06925bd861f0d71ffab4fb38bb4fdc45@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6796
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161029105733/http://www.securityfocus.com/bid/93944
https://web.archive.org/web/20161103080055/http://www.securitytracker.com/id/1037141
https://web.archive.org/web/20171012232225/http://www.securitytracker.com/id/1038757
https://www.cve.org/CVERecord?id=CVE-2016-6796
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-lib |
CVE-2016-6797 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/wrku5orwxfpt5mzl?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93940
http://www.securitytracker.com/id/1037145
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2859ac3eae132383cb6f3f2042e25d7a4a281b0d
https://github.com/apache/tomcat/commit/b3406e6c318378cbf440f902f9fdbb8b440aef4e
https://github.com/apache/tomcat/commit/d6b5600afe75e1086dd564344e1d085966e4237d
https://github.com/apache/tomcat80/commit/824c7dc781056442046db0ae34bcf1497f23f44c
https://linux.oracle.com/cve/CVE-2016-6797.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9325837eb00cba5752c092047433c7f0415134d16e7f391447ff4352%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9325837eb00cba5752c092047433c7f0415134d16e7f391447ff4352@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6797
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20170320064509/http://www.securitytracker.com/id/1037145
https://web.archive.org/web/20170423095945/http://www.securityfocus.com/bid/93940
https://www.cve.org/CVERecord?id=CVE-2016-6797
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-lib |
CVE-2018-8034 |
LOW |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283%40minotaur.apache.org%3E
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3E
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104895
http://www.securitytracker.com/id/1041374
https://access.redhat.com/errata/RHSA-2019:0130
https://access.redhat.com/errata/RHSA-2019:0131
https://access.redhat.com/errata/RHSA-2019:0450
https://access.redhat.com/errata/RHSA-2019:0451
https://access.redhat.com/errata/RHSA-2019:1159
https://access.redhat.com/errata/RHSA-2019:1160
https://access.redhat.com/errata/RHSA-2019:1161
https://access.redhat.com/errata/RHSA-2019:1162
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/errata/RHSA-2019:3892
https://access.redhat.com/security/cve/CVE-2018-8034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8034
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2835bb4e030c1c741ed0847bb3b9c3822e4fbc8a
https://github.com/apache/tomcat/commit/2c522795166c930741a9cecca76797bf48cb1634
https://linux.oracle.com/cve/CVE-2018-8034.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2018-8034
https://security.netapp.com/advisory/ntap-20180817-0001
https://security.netapp.com/advisory/ntap-20180817-0001/
https://ubuntu.com/security/notices/USN-3723-1
https://usn.ubuntu.com/3723-1
https://usn.ubuntu.com/3723-1/
https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104895
https://web.archive.org/web/20200517032514/http://www.securitytracker.com/id/1041374
https://www.cve.org/CVERecord?id=CVE-2018-8034
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat-lib |
CVE-2019-0221 |
LOW |
7.0.42-4.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html
http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2019/May/50
http://www.securityfocus.com/bid/108545
https://access.redhat.com/errata/RHSA-2019:3929
https://access.redhat.com/errata/RHSA-2019:3931
https://access.redhat.com/security/cve/CVE-2019-0221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0221
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/15fcd166ea2c1bb79e8541b8e1a43da9c452ceea
https://github.com/apache/tomcat/commit/44ec74c44dcd05cd7e90967c04d40b51440ecd7e
https://github.com/apache/tomcat/commit/4fcdf706f3ecf35912a600242f89637f5acb32da
https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46
https://mail-archives.apache.org/mod_mbox/www-announce/201905.mbox/%3Cb1905aa6-f340-8d0b-58c4-8ac3ebcbfa54@apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-0221
https://seclists.org/bugtraq/2019/Dec/43
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20190606-0001
https://security.netapp.com/advisory/ntap-20190606-0001/
https://support.f5.com/csp/article/K13184144?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K13184144?utm_source=f5support&utm_medium=RSS
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4128-1
https://ubuntu.com/security/notices/USN-4128-2
https://usn.ubuntu.com/4128-1
https://usn.ubuntu.com/4128-1/
https://usn.ubuntu.com/4128-2
https://usn.ubuntu.com/4128-2/
https://web.archive.org/web/20200227055048/http://www.securityfocus.com/bid/108545
https://www.cve.org/CVERecord?id=CVE-2019-0221
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221
https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/
|
| tomcat-lib |
CVE-2019-17563 |
LOW |
7.0.42-4.el7 |
7.0.76-15.el7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html
http://mail-archives.apache.org/mod_mbox/www-announce/201912.mbox/%3C21b7a375-7297-581b-1f8e-06622d36775b@apache.org%3E
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.30
https://access.redhat.com/security/cve/CVE-2019-17563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17563
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2019-17563.html
https://linux.oracle.com/errata/ELSA-2020-4004.html
https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e%40%3Cissues.cxf.apache.org%3E
https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17563
https://seclists.org/bugtraq/2019/Dec/43
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20200107-0001
https://security.netapp.com/advisory/ntap-20200107-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.99
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.50
https://ubuntu.com/security/notices/USN-4251-1
https://usn.ubuntu.com/4251-1
https://usn.ubuntu.com/4251-1/
https://www.cve.org/CVERecord?id=CVE-2019-17563
https://www.debian.org/security/2019/dsa-4596
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
|
| tomcat-lib |
CVE-2020-1935 |
LOW |
7.0.42-4.el7 |
7.0.76-16.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
https://access.redhat.com/security/cve/CVE-2020-1935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1935
https://linux.oracle.com/cve/CVE-2020-1935.html
https://linux.oracle.com/errata/ELSA-2020-5020.html
https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1935
https://security.netapp.com/advisory/ntap-20200327-0005
https://security.netapp.com/advisory/ntap-20200327-0005/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31
https://ubuntu.com/security/notices/USN-4448-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://www.cve.org/CVERecord?id=CVE-2020-1935
https://www.debian.org/security/2020/dsa-4673
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| tomcat-lib |
CVE-2021-25329 |
LOW |
7.0.42-4.el7 |
|
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3C811bba77-e74e-9f9b-62ca-5253a09ba84f%40apache.org%3E
http://www.openwall.com/lists/oss-security/2021/03/01/2
https://access.redhat.com/security/cve/CVE-2021-25329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25329
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2021-25329
https://security.gentoo.org/glsa/202208-34
https://security.netapp.com/advisory/ntap-20210409-0002
https://security.netapp.com/advisory/ntap-20210409-0002/
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.108
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43
https://ubuntu.com/security/notices/USN-5360-1
https://www.cve.org/CVERecord?id=CVE-2021-25329
https://www.debian.org/security/2021/dsa-4891
https://www.openwall.com/lists/oss-security/2021/03/01/2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-lib |
CVE-2022-29885 |
LOW |
7.0.42-4.el7 |
|
http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2022-29885
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0fa7721f11d565a2cd2e44366c388ad6a3e6357d
https://github.com/apache/tomcat/commit/36826ea638457d7e17876a70f89cb435b6db0d91
https://github.com/apache/tomcat/commit/b679bc627f5a4ea6510af95adfb7476b07eba890
https://github.com/apache/tomcat/commit/eaafd28296c54d983e28a47953c1f5cb2c334f48
https://lists.apache.org/thread/2b4qmhbcyqvc7dyfpjyx54c03x65vhcv
https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29885
https://security.netapp.com/advisory/ntap-20220629-0002
https://security.netapp.com/advisory/ntap-20220629-0002/
https://www.cve.org/CVERecord?id=CVE-2022-29885
https://www.debian.org/security/2022/dsa-5265
https://www.oracle.com/security-alerts/cpujul2022.html
|
| tomcat-lib |
CVE-2022-4132 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-4132
https://bugzilla.redhat.com/show_bug.cgi?id=2147372
https://nvd.nist.gov/vuln/detail/CVE-2022-4132
https://www.cve.org/CVERecord?id=CVE-2022-4132
|
| tomcat-lib |
CVE-2022-42252 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-42252
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0d089a15047faf9cb3c82f80f4d28febd4798920
https://github.com/apache/tomcat/commit/4c7f4fd09d2cc1692112ef70b8ee23a7a037ae77
https://github.com/apache/tomcat/commit/a1c07906d8dcaf7957e5cc97f5cdbac7d18a205a
https://github.com/apache/tomcat/commit/c9fe754e5d17e262dfbd3eab2a03ca96ff372dc3
https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq
https://nvd.nist.gov/vuln/detail/CVE-2022-42252
https://security.gentoo.org/glsa/202305-37
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2022-42252
|
| tomcat-lib |
CVE-2022-45143 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-45143
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0cab3a56bd89f70e7481bb0d68395dc7e130dbbf
https://github.com/apache/tomcat/commit/6a0ac6a438cbbb66b6e9c5223842f53bf0cb50aa
https://github.com/apache/tomcat/commit/b336f4e58893ea35114f1e4a415657f723b1298e
https://lists.apache.org/thread/yqkd183xrw3wqvnpcg3osbcryq85fkzj
https://nvd.nist.gov/vuln/detail/CVE-2022-45143
https://security.gentoo.org/glsa/202305-37
https://www.cve.org/CVERecord?id=CVE-2022-45143
|
| tomcat-servlet-3.0-api |
CVE-2014-0186 |
HIGH |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://www.osvdb.org/108060
https://access.redhat.com/security/cve/CVE-2014-0186
https://bugzilla.redhat.com/show_bug.cgi?id=1089884
https://linux.oracle.com/cve/CVE-2014-0186.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://nvd.nist.gov/vuln/detail/CVE-2014-0186
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://security-tracker.debian.org/tracker/CVE-2014-0186
https://www.cve.org/CVERecord?id=CVE-2014-0186
|
| tomcat-servlet-3.0-api |
CVE-2016-5425 |
HIGH |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
http://legalhackers.com/advisories/Tomcat-RedHat-based-Root-Privilege-Escalation-Exploit.txt
http://packetstormsecurity.com/files/139041/Apache-Tomcat-8-7-6-Privilege-Escalation.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://www.openwall.com/lists/oss-security/2016/10/10/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93472
http://www.securitytracker.com/id/1036979
https://access.redhat.com/security/cve/CVE-2016-5425
https://linux.oracle.com/cve/CVE-2016-5425.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d%40%3Cissues.activemq.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-5425
https://www.cve.org/CVERecord?id=CVE-2016-5425
https://www.exploit-db.com/exploits/40488/
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat-servlet-3.0-api |
CVE-2016-8745 |
HIGH |
7.0.42-4.el7 |
7.0.69-11.el7_3 |
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-0527.html
http://www.debian.org/security/2017/dsa-3754
http://www.debian.org/security/2017/dsa-3755
http://www.openwall.com/lists/oss-security/2016/12/12/1
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/94828
http://www.securitytracker.com/id/1037432
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:0935
https://access.redhat.com/security/cve/CVE-2016-8745
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/143bb466cf96a89e791b7db5626055ea819dad89
https://github.com/apache/tomcat/commit/16a57bc885e212839f1d717b94b01d154a36943a
https://github.com/apache/tomcat/commit/cbc9b18a845d3c8c053ac293dffda6c6c19dd92b
https://github.com/apache/tomcat80/commit/3dd2fec73e0de1edc1d3eb1c52a01255fdfc84e7
https://linux.oracle.com/cve/CVE-2016-8745.html
https://linux.oracle.com/errata/ELSA-2017-0935.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/4113c05d37f37c12b8033205684f04033c5f7a9bae117d4af23b32b4%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/4113c05d37f37c12b8033205684f04033c5f7a9bae117d4af23b32b4@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-8745
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180607-0002
https://security.netapp.com/advisory/ntap-20180607-0002/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.49
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.74
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.40
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.9
https://ubuntu.com/security/notices/USN-3177-1
https://web.archive.org/web/20200227165932/http://www.securityfocus.com/bid/94828
https://web.archive.org/web/20200517114357/http://www.securitytracker.com/id/1037432
https://www.cve.org/CVERecord?id=CVE-2016-8745
|
| tomcat-servlet-3.0-api |
CVE-2017-12615 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html
http://www.securityfocus.com/bid/100901
http://www.securitytracker.com/id/1039392
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/security/cve/CVE-2017-12615
https://github.com/advisories/GHSA-pjfr-qf3p-3q25
https://github.com/breaktoprotect/CVE-2017-12615
https://linux.oracle.com/cve/CVE-2017-12615.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-12615
https://security.netapp.com/advisory/ntap-20171018-0001
https://security.netapp.com/advisory/ntap-20171018-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
https://www.cve.org/CVERecord?id=CVE-2017-12615
https://www.exploit-db.com/exploits/42953
https://www.exploit-db.com/exploits/42953/
https://www.synology.com/support/security/Synology_SA_17_54_Tomcat
|
| tomcat-servlet-3.0-api |
CVE-2017-12617 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.securityfocus.com/bid/100954
http://www.securitytracker.com/id/1039552
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/errata/RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2018:0268
https://access.redhat.com/errata/RHSA-2018:0269
https://access.redhat.com/errata/RHSA-2018:0270
https://access.redhat.com/errata/RHSA-2018:0271
https://access.redhat.com/errata/RHSA-2018:0275
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/security/cve/CVE-2017-12617
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12617
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/24aea94807f940ee44aa550378dc903289039ddd
https://github.com/apache/tomcat/commit/31e99502e2c602449a2f8835bd23ade772b77333
https://github.com/apache/tomcat/commit/327e8a6644e188764325a013aa2725a60f1b37e5
https://github.com/apache/tomcat/commit/46dfedbc0523d7182be97f4244d7b6c942164485
https://github.com/apache/tomcat/commit/4cf7dab88282c8f3c92f0b961cdb0096e1d63e88
https://github.com/apache/tomcat/commit/506d862e7edfa991de198e0f2e4c4540830fa531
https://github.com/apache/tomcat/commit/512a3c3aecdb52de092c6bacddd71b85c4feda06
https://github.com/apache/tomcat/commit/74ad0e216c791454a318c1811300469eedc5c6f3
https://github.com/apache/tomcat/commit/a9dd96046d7acb0357c6b7b9e6cc70d186fae663
https://github.com/apache/tomcat/commit/b577f9a7996b92b650b1649af3c3bae11c120db9
https://github.com/apache/tomcat/commit/b7e0435d17aba69f16ae9e8a78ad0f1565b552af
https://github.com/apache/tomcat/commit/bbcbb749c75056a2781f37038d63e646fe972104
https://github.com/apache/tomcat/commit/c177e9668d1278710bdb14c0eb8d2702b3655f5a
https://github.com/apache/tomcat/commit/cf0b37beb0622abdf24acc7110daf883f3fe4f95
https://github.com/apache/tomcat/commit/d5b170705d24c386d76038e5989045c89795c28c
https://github.com/apache/tomcat/commit/e650cf1b83e441dbd3863f3f6b61c972cafce19e
https://github.com/apache/tomcat/commit/f1b85da754c4760787d68a99e839b50878140b57
https://github.com/apache/tomcat/commit/fd52f8601170b91f9d7162510e54563e5bf6bdfe
https://linux.oracle.com/cve/CVE-2017-12617.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3fd341a604c4e9eab39e7eaabbbac39c30101a022acc11dd09d7ebcb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2017/11/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2017-12617
https://security.netapp.com/advisory/ntap-20171018-0002
https://security.netapp.com/advisory/ntap-20171018-0002/
https://security.netapp.com/advisory/ntap-20180117-0002
https://security.netapp.com/advisory/ntap-20180117-0002/
https://support.f5.com/csp/article/K53173544
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03812en_us
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20171110171954/http://www.securityfocus.com/bid/100954
https://web.archive.org/web/20201209024734/http://www.securitytracker.com/id/1039552
https://www.alphabot.com/security/blog/2017/java/Apache-Tomcat-RCE-CVE-2017-12617.html
https://www.cve.org/CVERecord?id=CVE-2017-12617
https://www.exploit-db.com/exploits/42966
https://www.exploit-db.com/exploits/42966/
https://www.exploit-db.com/exploits/43008
https://www.exploit-db.com/exploits/43008/
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| tomcat-servlet-3.0-api |
CVE-2017-5647 |
HIGH |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.arubanetworks.com/assets/alert/HPESBHF03730.txt
http://www.debian.org/security/2017/dsa-3842
http://www.debian.org/security/2017/dsa-3843
http://www.openwall.com/lists/oss-security/2017/04/10/24
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.securitytracker.com/id/1038218
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/security/cve/CVE-2017-5647
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/864aa1199ad2cccc9a7e7c6b977f7d7f812c9910
https://github.com/apache/tomcat/commit/a4efd3ca1ccbdfc398136d76c0d8b7ad5a1e4905
https://github.com/apache/tomcat/commit/f5e06b8c743b1daa9eb5e817863958b6b320e044
https://github.com/apache/tomcat80/commit/ec10b8c785d1db91fe58946436f854dde04410fd
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03730en_us
https://linux.oracle.com/cve/CVE-2017-5647.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5796678c5a773c6f3ff57c178ac247d85ceca0dee9190ba48171451a%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5796678c5a773c6f3ff57c178ac247d85ceca0dee9190ba48171451a@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5647
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180614-0001
https://security.netapp.com/advisory/ntap-20180614-0001/
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170420114447/http://www.securitytracker.com/id/1038218
https://www.cve.org/CVERecord?id=CVE-2017-5647
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-servlet-3.0-api |
CVE-2017-5664 |
HIGH |
7.0.42-4.el7 |
7.0.69-12.el7_3 |
http://apt.inguza.net/wheezy-security/tomcat/tomcat8-CVE-2017-5664.patch
http://www.debian.org/security/2017/dsa-3891
http://www.debian.org/security/2017/dsa-3892
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/98888
http://www.securitytracker.com/id/1038641
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:1809
https://access.redhat.com/errata/RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2494
https://access.redhat.com/errata/RHSA-2017:2633
https://access.redhat.com/errata/RHSA-2017:2635
https://access.redhat.com/errata/RHSA-2017:2636
https://access.redhat.com/errata/RHSA-2017:2637
https://access.redhat.com/errata/RHSA-2017:2638
https://access.redhat.com/errata/RHSA-2017:3080
https://access.redhat.com/security/cve/CVE-2017-5664
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/29893e66111d33cfe99dd01cb146317c0c262ef4
https://github.com/apache/tomcat/commit/3242efea525df01d15da6e90ea69a9a21b10b454
https://github.com/apache/tomcat/commit/3bfe9fb886598c4d8ecbe674216152006bbce456
https://github.com/apache/tomcat/commit/4545dcce444aa619374a659cb450dbbd0be3c921
https://github.com/apache/tomcat/commit/58b32048ce25cb812ae394dafb0cd57254c68155
https://github.com/apache/tomcat/commit/7d93527254d9e9371b342800617f20d13c8b85ad
https://github.com/apache/tomcat80/commit/25d3c0d93190ef165ecd6c744bc15b5059abfa8f
https://github.com/apache/tomcat80/commit/e070a31ec81b56377822e44883c64abb41f36a3b
https://linux.oracle.com/cve/CVE-2017-5664.html
https://linux.oracle.com/errata/ELSA-2017-3080.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5664
https://security.netapp.com/advisory/ntap-20171019-0002
https://security.netapp.com/advisory/ntap-20171019-0002/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.78
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.44
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.15
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170801120345/http://www.securitytracker.com/id/1038641
https://web.archive.org/web/20170805032345/http://www.securityfocus.com/bid/98888
https://www.cve.org/CVERecord?id=CVE-2017-5664
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-servlet-3.0-api |
CVE-2018-1336 |
HIGH |
7.0.42-4.el7 |
7.0.76-8.el7_5 |
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090435.GA60759%40minotaur.apache.org%3E
http://www.securityfocus.com/bid/104898
http://www.securitytracker.com/id/1041375
https://access.redhat.com/errata/RHEA-2018:2188
https://access.redhat.com/errata/RHEA-2018:2189
https://access.redhat.com/errata/RHSA-2018:2700
https://access.redhat.com/errata/RHSA-2018:2701
https://access.redhat.com/errata/RHSA-2018:2740
https://access.redhat.com/errata/RHSA-2018:2741
https://access.redhat.com/errata/RHSA-2018:2742
https://access.redhat.com/errata/RHSA-2018:2743
https://access.redhat.com/errata/RHSA-2018:2921
https://access.redhat.com/errata/RHSA-2018:2930
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2018:2945
https://access.redhat.com/errata/RHSA-2018:3768
https://access.redhat.com/security/cve/CVE-2018-1336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1336
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/156d76a6afeef440d14044a560d6ad1d029361c4
https://github.com/apache/tomcat/commit/92cd494555598e99dd691712e8ee426a2f9c2e93
https://github.com/apache/tomcat/commit/e00812b94e5830b2be3de04f4ae4ade38a700074
https://github.com/apache/tomcat80/commit/9e9b7fe1b5732277a26e437f1d32155de6208ef2
https://linux.oracle.com/cve/CVE-2018-1336.html
https://linux.oracle.com/errata/ELSA-2018-2921.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1336
https://security.netapp.com/advisory/ntap-20180817-0001
https://security.netapp.com/advisory/ntap-20180817-0001/
https://support.f5.com/csp/article/K73008537?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K73008537?utm_source=f5support&utm_medium=RSS
https://ubuntu.com/security/notices/USN-3723-1
https://usn.ubuntu.com/3723-1
https://usn.ubuntu.com/3723-1/
https://web.archive.org/web/20190703075545/http://www.securitytracker.com/id/1041375
https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104898
https://www.cve.org/CVERecord?id=CVE-2018-1336
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| tomcat-servlet-3.0-api |
CVE-2020-13935 |
HIGH |
7.0.42-4.el7 |
7.0.76-15.el7 |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202007.mbox/%3C39e4200c-6f4e-b85d-fe4b-a9c2bd5fdc3d%40apache.org%3E
http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M7
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.105
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.57
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.37
https://access.redhat.com/security/cve/CVE-2020-13935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/12d715676038efbf9c728af10163f8277fc019d5
https://github.com/apache/tomcat/commit/1c1c77b0efb667cea80b532440b44cea1dc427c3
https://github.com/apache/tomcat/commit/40fa74c74822711ab878079d0a69f7357926723d
https://github.com/apache/tomcat/commit/4c04982870d6e730c38e21e58fb653b7cf723784
https://github.com/apache/tomcat/commit/f9f75c14678b68633f79030ddf4ff827f014cc84
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-13935.html
https://linux.oracle.com/errata/ELSA-2020-4004.html
https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html
https://nvd.nist.gov/vuln/detail/CVE-2020-13935
https://security.netapp.com/advisory/ntap-20200724-0003
https://security.netapp.com/advisory/ntap-20200724-0003/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4448-1
https://ubuntu.com/security/notices/USN-4596-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://usn.ubuntu.com/4596-1
https://usn.ubuntu.com/4596-1/
https://www.cve.org/CVERecord?id=CVE-2020-13935
https://www.debian.org/security/2020/dsa-4727
https://www.openwall.com/lists/oss-security/2020/07/14/3
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-servlet-3.0-api |
CVE-2020-1938 |
HIGH |
7.0.42-4.el7 |
7.0.76-11.el7_7 |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html
http://support.blackberry.com/kb/articleDetail?articleNumber=000062739
https://access.redhat.com/security/cve/CVE-2020-1938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1938
https://linux.oracle.com/cve/CVE-2020-1938.html
https://linux.oracle.com/errata/ELSA-2020-0912.html
https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a%40%3Cusers.tomee.apache.org%3E
https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a@%3Cusers.tomee.apache.org%3E
https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2%40%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E
https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425%40%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425@%3Cnotifications.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7%40%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7@%3Ccommits.ofbiz.apache.org%3E
https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2%40%3Cissues.geode.apache.org%3E
https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E
https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca%40%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca@%3Cbugs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3@%3Ccommits.tomee.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B
https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/
https://nvd.nist.gov/vuln/detail/CVE-2020-1938
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20200226-0002
https://security.netapp.com/advisory/ntap-20200226-0002/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31
https://www.cnvd.org.cn/webinfo/show/5415
https://www.cve.org/CVERecord?id=CVE-2020-1938
https://www.debian.org/security/2020/dsa-4673
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.tenable.com/blog/cve-2020-1938-ghostcat-apache-tomcat-ajp-file-readinclusion-vulnerability-cnvd-2020-10487
|
| tomcat-servlet-3.0-api |
CVE-2020-9484 |
HIGH |
7.0.42-4.el7 |
7.0.76-12.el7_8 |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202005.mbox/%3Ce3a0a517-bf82-ba62-0af6-24b83ea0e4e2%40apache.org%3E
http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html
http://seclists.org/fulldisclosure/2020/Jun/6
http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M5
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.104
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.55
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.35
http://www.openwall.com/lists/oss-security/2021/03/01/2
https://access.redhat.com/security/cve/CVE-2020-9484
https://bugzilla.suse.com/show_bug.cgi?id=1171928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222 (9.0.35)
https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222.patch
https://github.com/apache/tomcat/commit/4785433a226a20df6acbea49296e1ce7e23de453
https://github.com/apache/tomcat/commit/53e30390943c18fca0c9e57dbcc14f1c623cfd06 (7.0.104)
https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4
https://github.com/apache/tomcat/commit/74b105657ffbd1d1de80455f03446c3bbf30d1f5
https://github.com/apache/tomcat/commit/93f0cc403a9210d469afc2bd9cf03ab3251c6f35
https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b
https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b (10.0.0-M5)
https://github.com/apache/tomcat/commit/ec08af18d0f9ddca3f2d800ef66fe7fd20afef2f (8.5.55)
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-9484.html
https://linux.oracle.com/errata/ELSA-2020-2530.html
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/05/msg00020.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N
https://nvd.nist.gov/vuln/detail/CVE-2020-9484
https://security.gentoo.org/glsa/202006-21
https://security.netapp.com/advisory/ntap-20200528-0005
https://security.netapp.com/advisory/ntap-20200528-0005/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4448-1
https://ubuntu.com/security/notices/USN-4596-1
https://ubuntu.com/security/notices/USN-5360-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://usn.ubuntu.com/4596-1
https://usn.ubuntu.com/4596-1/
https://www.cve.org/CVERecord?id=CVE-2020-9484
https://www.debian.org/security/2020/dsa-4727
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-servlet-3.0-api |
CVE-2023-34981 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2023-34981
https://bz.apache.org/bugzilla/show_bug.cgi?id=66512
https://bz.apache.org/bugzilla/show_bug.cgi?id=66591
https://github.com/advisories/GHSA-mppv-79ch-vw6q
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2214c8030522aa9b2a367dfa5d9acff1a03666ae
https://github.com/apache/tomcat/commit/2f0ca2378415f4cf0748f4bc8fa955f41f803fa5
https://github.com/apache/tomcat/commit/739c7381aed22b7636351caf885ddc519ab6b442
https://github.com/apache/tomcat/commit/f0742f47b98aca943097f7f88e0d1163f57527e3
https://lists.apache.org/thread/j1ksjh9m9gx1q60rtk1sbzmxhvj5h5qz
https://nvd.nist.gov/vuln/detail/CVE-2023-34981
https://security.netapp.com/advisory/ntap-20230714-0003
https://security.netapp.com/advisory/ntap-20230714-0003/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-34981
|
| tomcat-servlet-3.0-api |
CVE-2023-46589 |
HIGH |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/11/28/2
https://access.redhat.com/errata/RHSA-2024:1134
https://access.redhat.com/security/cve/CVE-2023-46589
https://bugzilla.redhat.com/2252050
https://bugzilla.redhat.com/show_bug.cgi?id=2252050
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46589
https://errata.almalinux.org/9/ALSA-2024-1134.html
https://errata.rockylinux.org/RLSA-2024:0539
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6f181e1062a472bc5f0234980f66cbde42c1041b
https://github.com/apache/tomcat/commit/7a2d8818fcea0b51747a67af9510ce7977245ebd
https://github.com/apache/tomcat/commit/aa92971e879a519384c517febc39fd04c48d4642
https://github.com/apache/tomcat/commit/b5776d769bffeade865061bc8ecbeb2b56167b08
https://linux.oracle.com/cve/CVE-2023-46589.html
https://linux.oracle.com/errata/ELSA-2024-1134.html
https://lists.apache.org/thread/0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr
https://lists.debian.org/debian-lts-announce/2024/01/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2023-46589
https://security.netapp.com/advisory/ntap-20231214-0009
https://security.netapp.com/advisory/ntap-20231214-0009/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-46589
https://www.openwall.com/lists/oss-security/2023/11/28/2
|
| tomcat-servlet-3.0-api |
CVE-2024-23672 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-23672
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0052b374684b613b0c849899b325ebe334ac6501
https://github.com/apache/tomcat/commit/3631adb1342d8bbd8598802a12b63ad02c37d591
https://github.com/apache/tomcat/commit/52d6650e062d880704898d7d8c1b2b7a3efe8068
https://github.com/apache/tomcat/commit/b0e3b1bd78de270d53e319d7cb79eb282aa53cb9
https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f
https://nvd.nist.gov/vuln/detail/CVE-2024-23672
https://www.cve.org/CVERecord?id=CVE-2024-23672
|
| tomcat-servlet-3.0-api |
CVE-2024-24549 |
HIGH |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2024-24549
https://lists.apache.org/thread/4c50rmomhbbsdgfjsgwlb51xdwfjdcvg
https://nvd.nist.gov/vuln/detail/CVE-2024-24549
https://www.cve.org/CVERecord?id=CVE-2024-24549
|
| tomcat-servlet-3.0-api |
CVE-2013-4286 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://advisories.mageia.org/MGASA-2014-0148.html
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2014-0343.html
http://rhn.redhat.com/errata/RHSA-2014-0344.html
http://rhn.redhat.com/errata/RHSA-2014-0345.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/57675
http://secunia.com/advisories/59036
http://secunia.com/advisories/59675
http://secunia.com/advisories/59722
http://secunia.com/advisories/59724
http://secunia.com/advisories/59733
http://secunia.com/advisories/59873
http://svn.apache.org/viewvc?view=revision&revision=1521829
http://svn.apache.org/viewvc?view=revision&revision=1521854
http://svn.apache.org/viewvc?view=revision&revision=1552565
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21667883
http://www-01.ibm.com/support/docview.wss?uid=swg21675886
http://www-01.ibm.com/support/docview.wss?uid=swg21677147
http://www-01.ibm.com/support/docview.wss?uid=swg21678113
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65773
http://www.ubuntu.com/usn/USN-2130-1
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2013-4286
https://bugzilla.redhat.com/show_bug.cgi?id=1069921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/41b90b6ebc3e7f898a5a87d197ddf63790d33315
https://github.com/apache/tomcat/commit/7c040003f1387795356605566be7870cf70e05dc
https://github.com/apache/tomcat/commit/bcce3e4997a4ed06fe03e2517443f3ad8ade2dfa
https://github.com/apache/tomcat/commit/d0b3e252eb168fafbfb4c3efc16d4192fc8fad6c
https://github.com/apache/tomcat80/commit/ff00954b78e6484e40f323c0cef2e6d95c2882b9
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2013-4286.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-4286
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://ubuntu.com/security/notices/USN-2130-1
https://web.archive.org/web/20140724174205/http://secunia.com/advisories/57675
https://web.archive.org/web/20140804172142/http://secunia.com/advisories/59036
https://web.archive.org/web/20141230041748/http://seclists.org/fulldisclosure/2014/Dec/23
https://web.archive.org/web/20160317145515/http://www.securityfocus.com/archive/1/534161/100/0/threaded
https://web.archive.org/web/20160729061926/http://www.securityfocus.com/bid/65773
https://web.archive.org/web/20161014054543/http://www-01.ibm.com/support/docview.wss?uid=swg21678231
https://web.archive.org/web/20161014054838/http://www-01.ibm.com/support/docview.wss?uid=swg21677147
https://web.archive.org/web/20161014054913/http://www-01.ibm.com/support/docview.wss?uid=swg21678113
https://web.archive.org/web/20161014054948/http://www-01.ibm.com/support/docview.wss?uid=swg21667883
https://web.archive.org/web/20161024215453/http://secunia.com/advisories/59873
https://web.archive.org/web/20161024215639/http://secunia.com/advisories/59722
https://web.archive.org/web/20161024215804/http://secunia.com/advisories/59675
https://web.archive.org/web/20161024220018/http://secunia.com/advisories/59724
https://web.archive.org/web/20161024220034/http://secunia.com/advisories/59733
https://www.cve.org/CVERecord?id=CVE-2013-4286
|
| tomcat-servlet-3.0-api |
CVE-2013-4322 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-5.el7_0 |
http://advisories.mageia.org/MGASA-2014-0148.html
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/59036
http://secunia.com/advisories/59675
http://secunia.com/advisories/59722
http://secunia.com/advisories/59724
http://secunia.com/advisories/59873
http://svn.apache.org/viewvc?view=revision&revision=1521834
http://svn.apache.org/viewvc?view=revision&revision=1521864
http://svn.apache.org/viewvc?view=revision&revision=1549522
http://svn.apache.org/viewvc?view=revision&revision=1549523
http://svn.apache.org/viewvc?view=revision&revision=1556540
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21667883
http://www-01.ibm.com/support/docview.wss?uid=swg21675886
http://www-01.ibm.com/support/docview.wss?uid=swg21677147
http://www-01.ibm.com/support/docview.wss?uid=swg21678113
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/65767
http://www.ubuntu.com/usn/USN-2130-1
http://www.vmware.com/security/advisories/VMSA-2014-0008.html
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2013-4322
https://bugzilla.redhat.com/show_bug.cgi?id=1069905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4322
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/70dc3b279f7c99136c2c51bce8812508b4893c8b
https://github.com/apache/tomcat/commit/72613a0e2f88af789c2acc7093c82ff02b95b6d1
https://github.com/apache/tomcat/commit/a91516b80deaf1d0c6e04a7931765fdac34c4ccd
https://github.com/apache/tomcat/commit/b8cb9f5f91e9210ca107fd80f3e6acd47531daa7
https://github.com/apache/tomcat/commit/bed3a1a0d06a3c787183c6e90f326bbe17e49dd4
https://github.com/apache/tomcat/commit/d6a9898125f34e593de426e8c7dabb0f224fc00f
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2013-4322.html
https://linux.oracle.com/errata/ELSA-2014-0686.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2013-4322
https://rhn.redhat.com/errata/RHSA-2014-0686.html
https://ubuntu.com/security/notices/USN-2130-1
https://web.archive.org/web/20140315211337/http://www.securityfocus.com/bid/65767
https://web.archive.org/web/20150503090027/http://www.securityfocus.com/archive/1/534161/100/0/threaded
https://web.archive.org/web/20151023203543/http://secunia.com/advisories/59873
https://web.archive.org/web/20161024215620/http://secunia.com/advisories/59036
https://web.archive.org/web/20161024215639/http://secunia.com/advisories/59722
https://web.archive.org/web/20161024215804/http://secunia.com/advisories/59675
https://web.archive.org/web/20161024220018/http://secunia.com/advisories/59724
https://www.cve.org/CVERecord?id=CVE-2013-4322
|
| tomcat-servlet-3.0-api |
CVE-2014-0075 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://secunia.com/advisories/59121
http://secunia.com/advisories/59616
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://secunia.com/advisories/60793
http://svn.apache.org/viewvc?view=revision&revision=1578337
http://svn.apache.org/viewvc?view=revision&revision=1578341
http://svn.apache.org/viewvc?view=revision&revision=1579262
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21680603
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.novell.com/support/kb/doc.php?id=7010166
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67671
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0075
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/b6974571c122f6a1e7ec74a90fa212976fa7b0ed
https://github.com/apache/tomcat/commit/f646a5acd5e32d6f5a2d9bf1d94ca66b65477675
https://github.com/apache/tomcat80/commit/d49a03728ac7e3c800b1b0ce0eeccd8a5a21bb91
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0075.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0075
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0075
|
| tomcat-servlet-3.0-api |
CVE-2014-0099 |
MEDIUM |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=141390017113542&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/138
http://seclists.org/fulldisclosure/2014/May/140
http://secunia.com/advisories/59121
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://secunia.com/advisories/60793
http://svn.apache.org/viewvc?view=revision&revision=1578812
http://svn.apache.org/viewvc?view=revision&revision=1578814
http://svn.apache.org/viewvc?view=revision&revision=1580473
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21680603
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.securityfocus.com/archive/1/532218/100/0/threaded
http://www.securityfocus.com/archive/1/532221/100/0/threaded
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67668
http://www.securitytracker.com/id/1030302
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0099
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0099
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/184cdc0d3f03f5737e12d21fff246d7285034597
https://github.com/apache/tomcat/commit/fffd63a3bd3a5475379b7c074820a5463b7663b3
https://github.com/apache/tomcat80/commit/990de53ab923c126f7402090a4ca53df4bb80cbd
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0099.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0099
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0099
|
| tomcat-servlet-3.0-api |
CVE-2014-0227 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-2.el7_1 |
http://advisories.mageia.org/MGASA-2015-0081.html
http://archives.neohapsis.com/archives/bugtraq/2015-02/0067.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=143393515412274&w=2
http://marc.info/?l=bugtraq&m=143403519711434&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://rhn.redhat.com/errata/RHSA-2015-0983.html
http://rhn.redhat.com/errata/RHSA-2015-0991.html
http://svn.apache.org/viewvc?view=revision&revision=1600984
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/72717
http://www.securitytracker.com/id/1032791
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/security/cve/CVE-2014-0227
https://bugzilla.redhat.com/show_bug.cgi?id=1109196
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0227
https://linux.oracle.com/cve/CVE-2014-0227.html
https://linux.oracle.com/errata/ELSA-2015-0991.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0227
https://source.jboss.org/changelog/JBossWeb?cs=2455
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.43
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-0227
|
| tomcat-servlet-3.0-api |
CVE-2014-7810 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2015-1621.html
http://rhn.redhat.com/errata/RHSA-2015-1622.html
http://rhn.redhat.com/errata/RHSA-2016-0492.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://svn.apache.org/viewvc?view=revision&revision=1644018
http://svn.apache.org/viewvc?view=revision&revision=1645642
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.44
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.59
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.17
http://www.debian.org/security/2015/dsa-3428
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/74665
http://www.securitytracker.com/id/1032330
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/security/cve/CVE-2014-7810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://linux.oracle.com/cve/CVE-2014-7810.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-7810
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-7810
|
| tomcat-servlet-3.0-api |
CVE-2015-5351 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://packetstormsecurity.com/files/135882/Apache-Tomcat-CSRF-Token-Leak.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/148
http://svn.apache.org/viewvc?view=revision&revision=1720652
http://svn.apache.org/viewvc?view=revision&revision=1720655
http://svn.apache.org/viewvc?view=revision&revision=1720658
http://svn.apache.org/viewvc?view=revision&revision=1720660
http://svn.apache.org/viewvc?view=revision&revision=1720661
http://svn.apache.org/viewvc?view=revision&revision=1720663
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/83330
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5351
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351
https://github.com/apache/tomcat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5351.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5351
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://softwaresupport.hpe.com/document/-/facetsearch/document/KM02978021
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20161020161943/http://www.securityfocus.com/bid/83330
https://www.cve.org/CVERecord?id=CVE-2015-5351
|
| tomcat-servlet-3.0-api |
CVE-2016-0714 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/145
http://svn.apache.org/viewvc?view=revision&revision=1725263
http://svn.apache.org/viewvc?view=revision&revision=1725914
http://svn.apache.org/viewvc?view=revision&revision=1726196
http://svn.apache.org/viewvc?view=revision&revision=1726203
http://svn.apache.org/viewvc?view=revision&revision=1726923
http://svn.apache.org/viewvc?view=revision&revision=1727034
http://svn.apache.org/viewvc?view=revision&revision=1727166
http://svn.apache.org/viewvc?view=revision&revision=1727182
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83327
http://www.securitytracker.com/id/1035069
http://www.securitytracker.com/id/1037640
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0714
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/50f1b1da794cd93b70ab5456d3c2c984408e1506
https://github.com/apache/tomcat/commit/79e8ad03404c131009811855f9a30d8d01c0c736
https://github.com/apache/tomcat/commit/824eb1d1ad922e7652ecf51adb2b9eebb5bb88b5
https://github.com/apache/tomcat/commit/e1b1002129fea4033329f6f619ba219527bbbd40
https://github.com/apache/tomcat/commit/f626da75fd59da82b14dee7b8cc46ad51eefdbe5
https://github.com/apache/tomcat/commit/ff1b659dc366a2ad47cd8f7e3544c796a1b15e46
https://github.com/apache/tomcat80/commit/2e5cc28052e84ba45196949ba602484221bbf33c
https://github.com/apache/tomcat80/commit/5430f30c79383e4d2d87785468905fcb00bace58
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2016-0714.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0714
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20170204045529/http://www.securityfocus.com/bid/83327
https://web.archive.org/web/20170601064840/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20170927131230/http://www.securitytracker.com/id/1037640
https://www.cve.org/CVERecord?id=CVE-2016-0714
|
| tomcat-servlet-3.0-api |
CVE-2016-0763 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179356.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/147
http://svn.apache.org/viewvc?view=revision&revision=1725926
http://svn.apache.org/viewvc?view=revision&revision=1725929
http://svn.apache.org/viewvc?view=revision&revision=1725931
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/83326
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0763
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/76ebc9007567c8326217dd94844540e1e27d8468
https://github.com/apache/tomcat/commit/c08641da04d31f730b56b8675301e55db97dfe88
https://github.com/apache/tomcat80/commit/0531f7aeff1999d362e0a68512a3517f2cf1a6ae
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755
https://linux.oracle.com/cve/CVE-2016-0763.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0763
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160314101138/http://www.securityfocus.com/bid/83326
https://web.archive.org/web/20160404202803/http://www.securitytracker.com/id/1035069
https://www.cve.org/CVERecord?id=CVE-2016-0763
|
| tomcat-servlet-3.0-api |
CVE-2016-3092 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://jvn.jp/en/jp/JVN89379547/index.html
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000121
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E
http://markmail.org/message/oyxfv73jb2g7rjg3
http://rhn.redhat.com/errata/RHSA-2016-2068.html
http://rhn.redhat.com/errata/RHSA-2016-2069.html
http://rhn.redhat.com/errata/RHSA-2016-2070.html
http://rhn.redhat.com/errata/RHSA-2016-2071.html
http://rhn.redhat.com/errata/RHSA-2016-2072.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://svn.apache.org/viewvc?view=revision&revision=1743480
http://svn.apache.org/viewvc?view=revision&revision=1743722
http://svn.apache.org/viewvc?view=revision&revision=1743738
http://svn.apache.org/viewvc?view=revision&revision=1743742
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3609
http://www.debian.org/security/2016/dsa-3611
http://www.debian.org/security/2016/dsa-3614
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91453
http://www.securitytracker.com/id/1036427
http://www.securitytracker.com/id/1036900
http://www.securitytracker.com/id/1037029
http://www.securitytracker.com/id/1039606
http://www.ubuntu.com/usn/USN-3024-1
http://www.ubuntu.com/usn/USN-3027-1
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/security/cve/CVE-2016-3092
https://bugzilla.redhat.com/show_bug.cgi?id=1349468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092
https://github.com/advisories/GHSA-fvm3-cfvj-gxqq
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05204371
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289840
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759
https://linux.oracle.com/cve/CVE-2016-3092.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-3092
https://security.gentoo.org/glsa/201705-09
https://security.gentoo.org/glsa/202107-39
https://security.netapp.com/advisory/ntap-20190212-0001
https://security.netapp.com/advisory/ntap-20190212-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://ubuntu.com/security/notices/USN-3027-1
https://web.archive.org/web/20160726114129/http://www.securitytracker.com/id/1036427
https://web.archive.org/web/20160924080828/http://www.securityfocus.com/bid/91453
https://web.archive.org/web/20170317103106/http://www.securitytracker.com/id/1037029
https://web.archive.org/web/20171103224941/http://www.securitytracker.com/id/1036900
https://web.archive.org/web/20171111060434/http://www.securitytracker.com/id/1039606
https://www.cve.org/CVERecord?id=CVE-2016-3092
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| tomcat-servlet-3.0-api |
CVE-2016-5388 |
MEDIUM |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
http://rhn.redhat.com/errata/RHSA-2016-1624.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/91818
http://www.securitytracker.com/id/1036331
https://access.redhat.com/errata/RHSA-2016:1624
https://access.redhat.com/errata/RHSA-2016:1635
https://access.redhat.com/errata/RHSA-2016:1636
https://access.redhat.com/errata/RHSA-2016:2045
https://access.redhat.com/errata/RHSA-2016:2046
https://access.redhat.com/security/cve/CVE-2016-5388
https://bugzilla.redhat.com/show_bug.cgi?id=1353809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/1b91e91194a095ea922f96d1dccddf6fbc446e54
https://github.com/apache/tomcat/commit/880250877b0643956435282afb9c111450cfff4c
https://github.com/apache/tomcat/commit/fb3569fbb9a2f55459aa8e1e22bc35a737e66329
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5388.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5388
https://rhn.redhat.com/errata/RHSA-2016-1624.html
https://rhn.redhat.com/errata/RHSA-2016-2045.html
https://rhn.redhat.com/errata/RHSA-2016-2046.html
https://tomcat.apache.org/tomcat-7.0-doc/changelog.html
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4791-1
https://www.apache.org/security/asf-httpoxy-response.txt
https://www.cve.org/CVERecord?id=CVE-2016-5388
https://www.kb.cert.org/vuls/id/797896
|
| tomcat-servlet-3.0-api |
CVE-2016-6816 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-11.el7_3 |
http://rhn.redhat.com/errata/RHSA-2017-0244.html
http://rhn.redhat.com/errata/RHSA-2017-0245.html
http://rhn.redhat.com/errata/RHSA-2017-0246.html
http://rhn.redhat.com/errata/RHSA-2017-0247.html
http://rhn.redhat.com/errata/RHSA-2017-0250.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-0527.html
http://www.debian.org/security/2016/dsa-3738
http://www.openwall.com/lists/oss-security/2016/11/22/17
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/94461
http://www.securitytracker.com/id/1037332
https://access.redhat.com/articles/2991951
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:0935
https://access.redhat.com/security/cve/CVE-2016-6816
https://access.redhat.com/solutions/2891171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816
https://github.com/apache/tomcat/commit/516bda676ac8d0284da3e0295a7df70391315360
https://github.com/apache/tomcat/commit/cdc0a935c2173aff60039a0b85e57a461381107c
https://github.com/apache/tomcat/commit/f96f5751d418ae5a2f550be040daf9c5f7d99256
https://github.com/apache/tomcat80/commit/779d5d34e68e50d2f721897050b147106992f566
https://linux.oracle.com/cve/CVE-2016-6816.html
https://linux.oracle.com/errata/ELSA-2017-0935.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6816
https://security.netapp.com/advisory/ntap-20180607-0001
https://security.netapp.com/advisory/ntap-20180607-0001/
https://svn.apache.org/viewvc?view=revision&revision=1767641
https://svn.apache.org/viewvc?view=revision&revision=1767645
https://svn.apache.org/viewvc?view=revision&revision=1767653
https://svn.apache.org/viewvc?view=revision&revision=1767675
https://svn.apache.org/viewvc?view=revision&revision=1767683
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161204121236/http://www.securityfocus.com/bid/94461
https://web.archive.org/web/20170929085438/http://www.securitytracker.com/id/1037332
https://www.cve.org/CVERecord?id=CVE-2016-6816
https://www.exploit-db.com/exploits/41783
https://www.exploit-db.com/exploits/41783/
|
| tomcat-servlet-3.0-api |
CVE-2017-12616 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.securityfocus.com/bid/100897
http://www.securitytracker.com/id/1039393
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/security/cve/CVE-2017-12616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12616
https://github.com/apache/tomcat
https://lists.apache.org/thread.html/1df9b4552464caa42047062fe7175da0da06c18ecc8daf99258bbda6%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1df9b4552464caa42047062fe7175da0da06c18ecc8daf99258bbda6@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2017-12616
https://security.netapp.com/advisory/ntap-20171018-0001
https://security.netapp.com/advisory/ntap-20171018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://www.cve.org/CVERecord?id=CVE-2017-12616
https://www.synology.com/support/security/Synology_SA_17_54_Tomcat
|
| tomcat-servlet-3.0-api |
CVE-2017-5648 |
MEDIUM |
7.0.42-4.el7 |
7.0.69-12.el7_3 |
http://www.debian.org/security/2017/dsa-3842
http://www.debian.org/security/2017/dsa-3843
http://www.openwall.com/lists/oss-security/2017/04/10/23
http://www.openwall.com/lists/oss-security/2020/07/20/8
http://www.securityfocus.com/bid/97530
http://www.securitytracker.com/id/1038220
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:1809
https://access.redhat.com/security/cve/CVE-2017-5648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5648
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0f7b9465d594b9814e1853d1e3a6e3aa51a21610
https://github.com/apache/tomcat/commit/6bb36dfdf6444efda074893dff493b9eb3648808
https://github.com/apache/tomcat/commit/dfa40863421d7681fed893b4256666491887e38c
https://github.com/apache/tomcat80/commit/6d73b079c55ee25dea1bbd0556bb568a4247dacd
https://linux.oracle.com/cve/CVE-2017-5648.html
https://linux.oracle.com/errata/ELSA-2017-1809.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2017-5648
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180614-0001
https://security.netapp.com/advisory/ntap-20180614-0001/
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20170417124117/http://www.securityfocus.com/bid/97530
https://web.archive.org/web/20170420115120/http://www.securitytracker.com/id/1038220
https://www.cve.org/CVERecord?id=CVE-2017-5648
|
| tomcat-servlet-3.0-api |
CVE-2017-7674 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-3.el7_4 |
http://www.debian.org/security/2017/dsa-3974
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.securityfocus.com/bid/100280
https://access.redhat.com/errata/RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:3081
https://access.redhat.com/security/cve/CVE-2017-7674
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7674
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/52382ebfbce20a98b01cd9d37184a12703987a5a
https://github.com/apache/tomcat/commit/9044c1672bbe4b2cf4c55028cc8b977cc62650e7
https://github.com/apache/tomcat/commit/b94478d45b7e1fc06134a785571f78772fa30fed
https://github.com/apache/tomcat80/commit/f52c242d92d4563dd1226dcc993ec37370ba9ce3
https://linux.oracle.com/cve/CVE-2017-7674.html
https://linux.oracle.com/errata/ELSA-2017-3081.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/22b4bb077502f847e2b9fcf00b96e81e734466ab459780ff73b60c0f%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/22b4bb077502f847e2b9fcf00b96e81e734466ab459780ff73b60c0f@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread/bol4f8wyjfsbo135tw9gy49o5nf8qpth
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2017-7674
https://security.netapp.com/advisory/ntap-20180614-0003
https://security.netapp.com/advisory/ntap-20180614-0003/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://svn.apache.org/viewvc?view=revision&revision=1795816
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://ubuntu.com/security/notices/USN-3519-1
https://web.archive.org/web/20171115015045/http://www.securityfocus.com/bid/100280
https://web.archive.org/web/20210116171055/http://www.securityfocus.com/bid/100280
https://www.cve.org/CVERecord?id=CVE-2017-7674
|
| tomcat-servlet-3.0-api |
CVE-2018-11784 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7_6 |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html
http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.91
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.34
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.12
http://www.securityfocus.com/bid/105524
https://access.redhat.com/errata/RHSA-2019:0130
https://access.redhat.com/errata/RHSA-2019:0131
https://access.redhat.com/errata/RHSA-2019:0485
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/security/cve/CVE-2018-11784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11784
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/advisories/GHSA-5q99-f34m-67gc
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/b76e1dfb3dec3789cc700f8d022c872eb947a221
https://github.com/apache/tomcat/commit/efb860b3ff8ebcf606199b8d0d432f76898040da
https://github.com/apache/tomcat/commit/f9f147359b7c95511b64cd99bbc47917c01b3879
https://kc.mcafee.com/corporate/index?page=content&id=SB10284
https://linux.oracle.com/cve/CVE-2018-11784.html
https://linux.oracle.com/errata/ELSA-2019-1529.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html
https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP
https://nvd.nist.gov/vuln/detail/CVE-2018-11784
https://seclists.org/bugtraq/2019/Dec/43
https://security.netapp.com/advisory/ntap-20181014-0002
https://security.netapp.com/advisory/ntap-20181014-0002/
https://ubuntu.com/security/notices/USN-3787-1
https://usn.ubuntu.com/3787-1
https://usn.ubuntu.com/3787-1/
https://web.archive.org/web/20200227030058/http://www.securityfocus.com/bid/105524
https://www.cve.org/CVERecord?id=CVE-2018-11784
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat-servlet-3.0-api |
CVE-2018-1304 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103170
http://www.securitytracker.com/id/1040427
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:1320
https://access.redhat.com/errata/RHSA-2018:1447
https://access.redhat.com/errata/RHSA-2018:1448
https://access.redhat.com/errata/RHSA-2018:1449
https://access.redhat.com/errata/RHSA-2018:1450
https://access.redhat.com/errata/RHSA-2018:1451
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-1304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1304
https://github.com/advisories/GHSA-6rxj-58jh-436r
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2d69fde135302e8cff984bb2131ec69f2e396964
https://github.com/apache/tomcat/commit/5af7c13cff7cc8366c5997418e820989fabb8f48
https://github.com/apache/tomcat/commit/723ea6a5bc5e7bc49e5ef84273c3b3c164a6a4fd
https://github.com/apache/tomcat80/commit/9e700b93e3bf5c605267d20568a964169f9e0b79
https://linux.oracle.com/cve/CVE-2018-1304.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1304
https://security.netapp.com/advisory/ntap-20180706-0001
https://security.netapp.com/advisory/ntap-20180706-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20200227102806/http://www.securityfocus.com/bid/103170
https://web.archive.org/web/20200516074457/http://www.securitytracker.com/id/1040427
https://www.cve.org/CVERecord?id=CVE-2018-1304
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-servlet-3.0-api |
CVE-2018-1305 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/103144
http://www.securitytracker.com/id/1040428
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/errata/RHSA-2018:1320
https://access.redhat.com/errata/RHSA-2018:2939
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-1305
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1305
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2349801827f09fb6582a8afdeca704294106ad9a
https://github.com/apache/tomcat/commit/2aac69f694d42d9219eb27018b3da0ae1bdd73ab
https://github.com/apache/tomcat/commit/3e54b2a6314eda11617ff7a7b899c251e222b1a1
https://github.com/apache/tomcat/commit/4d637bc3986e5d09b9363e2144b8ba74fa6eac3a
https://github.com/apache/tomcat/commit/c63b96d72cd39287e17b2ba698f4eee0ba508073
https://github.com/apache/tomcat/commit/de6b4fd58b64828f374503b9ec76a12017b92895
https://linux.oracle.com/cve/CVE-2018-1305.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1305
https://security.netapp.com/advisory/ntap-20180706-0001
https://security.netapp.com/advisory/ntap-20180706-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.85
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.50
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.28
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20200227030042/http://www.securityfocus.com/bid/103144
https://web.archive.org/web/20200516094320/http://www.securitytracker.com/id/1040428
https://www.cve.org/CVERecord?id=CVE-2018-1305
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
|
| tomcat-servlet-3.0-api |
CVE-2018-8014 |
MEDIUM |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.89
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.53
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.32
http://tomcat.apache.org/security-9.html
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.9
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104203
http://www.securitytracker.com/id/1040998
http://www.securitytracker.com/id/1041888
https://access.redhat.com/errata/RHSA-2018:2469
https://access.redhat.com/errata/RHSA-2018:2470
https://access.redhat.com/errata/RHSA-2018:3768
https://access.redhat.com/errata/RHSA-2019:0450
https://access.redhat.com/errata/RHSA-2019:0451
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/security/cve/CVE-2018-8014
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8014
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/advisories/GHSA-r4x2-3cq5-hqvp
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/5877390a9605f56d9bd6859a54ccbfb16374a78b
https://github.com/apache/tomcat/commit/60f596a21fd6041335a3a1a4015d4512439cecb5
https://github.com/apache/tomcat/commit/d83a76732e6804739b81d8b2056365307637b42d
https://github.com/apache/tomcat80/commit/2c9d8433bd3247a2856d4b2555447108758e813e
https://linux.oracle.com/cve/CVE-2018-8014.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://nvd.nist.gov/vuln/detail/CVE-2018-8014
https://seclists.org/bugtraq/2019/Dec/43
https://security.netapp.com/advisory/ntap-20181018-0002
https://security.netapp.com/advisory/ntap-20181018-0002/
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://web.archive.org/web/20181017143233/http://www.securityfocus.com/bid/104203
https://web.archive.org/web/20201207080723/http://www.securitytracker.com/id/1041888
https://web.archive.org/web/20201207101131/http://www.securitytracker.com/id/1040998
https://www.cve.org/CVERecord?id=CVE-2018-8014
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuapr2020.html
|
| tomcat-servlet-3.0-api |
CVE-2022-23181 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-23181
https://github.com/apache/tomcat
https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9
https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2022-23181
https://security.netapp.com/advisory/ntap-20220217-0010
https://security.netapp.com/advisory/ntap-20220217-0010/
https://www.cve.org/CVERecord?id=CVE-2022-23181
https://www.debian.org/security/2022/dsa-5265
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
|
| tomcat-servlet-3.0-api |
CVE-2023-24998 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/05/22/1
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-24998
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://commons.apache.org/proper/commons-fileupload/security-reports.html
https://commons.apache.org/proper/commons-fileupload/security-reports.html#Fixed_in_Apache_Commons_FileUpload_1.5
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/commons-fileupload
https://github.com/apache/commons-fileupload/commit/e20c04990f7420ca917e96a84cec58b13a1b3d17
https://github.com/apache/tomcat/commit/8a2285f13affa961cc65595aad999db5efae45ce
https://github.com/apache/tomcat/commit/9ca96c8c1eba86c0aaa2e6be581ba2a7d4d4ae6e
https://github.com/apache/tomcat/commit/cf77cc545de0488fb89e24294151504a7432df74
https://github.com/apache/tomcat/commit/d53d8e7f77042cc32a3b98f589496a1ef5088e38
https://linux.oracle.com/cve/CVE-2023-24998.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/4xl4l09mhwg4vgsk7dxqogcjrobrrdoy
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-24998
https://security.gentoo.org/glsa/202305-37
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-24998
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-servlet-3.0-api |
CVE-2023-28708 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-28708
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://bz.apache.org/bugzilla/show_bug.cgi?id=66471
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3b51230764da595bb19e8d0962dd8c69ab40dfab
https://github.com/apache/tomcat/commit/5b72c94e8b2c4ada63a1d91dc527bf4d8fd1f510
https://github.com/apache/tomcat/commit/c64d496dda1560b5df113be55fbfaefec349b50f
https://github.com/apache/tomcat/commit/f509bbf31fc00abe3d9f25ebfabca5e05173da5b
https://linux.oracle.com/cve/CVE-2023-28708.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/hdksc59z3s7tm39x0pp33mtwdrt8qr67
https://nvd.nist.gov/vuln/detail/CVE-2023-28708
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-28708
|
| tomcat-servlet-3.0-api |
CVE-2023-28709 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/05/22/1
https://access.redhat.com/errata/RHSA-2023:6570
https://access.redhat.com/security/cve/CVE-2023-28709
https://bugzilla.redhat.com/2172298
https://bugzilla.redhat.com/2180856
https://bugzilla.redhat.com/2210321
https://errata.almalinux.org/9/ALSA-2023-6570.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-28709.html
https://linux.oracle.com/errata/ELSA-2023-7065.html
https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j
https://nvd.nist.gov/vuln/detail/CVE-2023-28709
https://security.gentoo.org/glsa/202305-37
https://security.netapp.com/advisory/ntap-20230616-0004
https://security.netapp.com/advisory/ntap-20230616-0004/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-11.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2023-28709
https://www.debian.org/security/2023/dsa-5521
|
| tomcat-servlet-3.0-api |
CVE-2023-41080 |
MEDIUM |
7.0.42-4.el7 |
|
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-41080
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/4998ad745b67edeadefe541c94ed029b53933d3b
https://github.com/apache/tomcat/commit/77c0ce2d169efa248b64b992e547aad549ec906b
https://github.com/apache/tomcat/commit/bb4624a9f3e69d495182ebfa68d7983076407a27
https://github.com/apache/tomcat/commit/e3703c9abb8fe0d5602f6ba8a8f11d4b6940815a
https://linux.oracle.com/cve/CVE-2023-41080.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/71wvwprtx2j2m54fovq9zr7gbm2wow2f
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-41080
https://security.netapp.com/advisory/ntap-20230921-0006
https://security.netapp.com/advisory/ntap-20230921-0006/
https://www.cve.org/CVERecord?id=CVE-2023-41080
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-servlet-3.0-api |
CVE-2023-42794 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/8
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-42794
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-42794.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/vvbr2ms7lockj1hlhz5q3wmxb2mwcw82
https://nvd.nist.gov/vuln/detail/CVE-2023-42794
https://www.cve.org/CVERecord?id=CVE-2023-42794
|
| tomcat-servlet-3.0-api |
CVE-2023-42795 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/9
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-42795
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2023-42795.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/065jfyo583490r9j2v73nhpyxdob56lw
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-42795
https://security.netapp.com/advisory/ntap-20231103-0007
https://security.netapp.com/advisory/ntap-20231103-0007/
https://www.cve.org/CVERecord?id=CVE-2023-42795
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-servlet-3.0-api |
CVE-2023-45648 |
MEDIUM |
7.0.42-4.el7 |
|
http://www.openwall.com/lists/oss-security/2023/10/10/10
https://access.redhat.com/errata/RHSA-2024:0474
https://access.redhat.com/security/cve/CVE-2023-45648
https://bugzilla.redhat.com/2235370
https://bugzilla.redhat.com/2243749
https://bugzilla.redhat.com/2243751
https://bugzilla.redhat.com/2243752
https://errata.almalinux.org/9/ALSA-2024-0474.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/59583245639d8c42ae0009f4a4a70464d3ea70a0
https://github.com/apache/tomcat/commit/8ecff306507be8e4fd3adee1ae5de1ea6661a8f4
https://github.com/apache/tomcat/commit/eb5c094e5560764cda436362254997511a3ca1f6
https://linux.oracle.com/cve/CVE-2023-45648.html
https://linux.oracle.com/errata/ELSA-2024-0474.html
https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdp
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2023-45648
https://security.netapp.com/advisory/ntap-20231103-0007
https://security.netapp.com/advisory/ntap-20231103-0007/
https://www.cve.org/CVERecord?id=CVE-2023-45648
https://www.debian.org/security/2023/dsa-5521
https://www.debian.org/security/2023/dsa-5522
|
| tomcat-servlet-3.0-api |
CVE-2014-0096 |
LOW |
7.0.42-4.el7 |
7.0.42-6.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://linux.oracle.com/errata/ELSA-2014-0865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150282.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/135
http://secunia.com/advisories/59121
http://secunia.com/advisories/59616
http://secunia.com/advisories/59678
http://secunia.com/advisories/59732
http://secunia.com/advisories/59835
http://secunia.com/advisories/59849
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://svn.apache.org/viewvc?view=revision&revision=1578610
http://svn.apache.org/viewvc?view=revision&revision=1578611
http://svn.apache.org/viewvc?view=revision&revision=1578637
http://svn.apache.org/viewvc?view=revision&revision=1578655
http://svn.apache.org/viewvc?view=revision&revision=1585853
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.novell.com/support/kb/doc.php?id=7010166
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67667
http://www.securitytracker.com/id/1030301
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0096
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0096
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3c53c4da7bcf300f519eaed5ad1751d24dd59f6b
https://github.com/apache/tomcat/commit/5c545da226b3c71ed9603c38ad2de88057778c1b
https://github.com/apache/tomcat/commit/913d94b289e056107e521dbab8e79cc72a62a331
https://github.com/apache/tomcat/commit/970c23bfd24dfa1dcb86ed917e6c8b47dcfb4433
https://github.com/apache/tomcat80/commit/65ed69d96a101dfa99eea2cfe17e9e87b310084c
https://github.com/apache/tomcat80/commit/f3f2979df693a9c84c6742fcb162f3671b0a50d3
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0096.html
https://linux.oracle.com/errata/ELSA-2014-0865.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0096
https://ubuntu.com/security/notices/USN-2302-1
https://www.cve.org/CVERecord?id=CVE-2014-0096
|
| tomcat-servlet-3.0-api |
CVE-2014-0119 |
LOW |
7.0.42-4.el7 |
7.0.42-8.el7_0 |
http://advisories.mageia.org/MGASA-2014-0268.html
http://marc.info/?l=bugtraq&m=141017844705317&w=2
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://rhn.redhat.com/errata/RHSA-2015-0675.html
http://rhn.redhat.com/errata/RHSA-2015-0720.html
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://seclists.org/fulldisclosure/2014/Dec/23
http://seclists.org/fulldisclosure/2014/May/141
http://secunia.com/advisories/59732
http://secunia.com/advisories/59873
http://secunia.com/advisories/60729
http://svn.apache.org/viewvc?view=revision&revision=1588193
http://svn.apache.org/viewvc?view=revision&revision=1588199
http://svn.apache.org/viewvc?view=revision&revision=1589640
http://svn.apache.org/viewvc?view=revision&revision=1589837
http://svn.apache.org/viewvc?view=revision&revision=1589980
http://svn.apache.org/viewvc?view=revision&revision=1589983
http://svn.apache.org/viewvc?view=revision&revision=1589985
http://svn.apache.org/viewvc?view=revision&revision=1589990
http://svn.apache.org/viewvc?view=revision&revision=1589992
http://svn.apache.org/viewvc?view=revision&revision=1589997
http://svn.apache.org/viewvc?view=revision&revision=1590028
http://svn.apache.org/viewvc?view=revision&revision=1590036
http://svn.apache.org/viewvc?view=revision&revision=1593815
http://svn.apache.org/viewvc?view=revision&revision=1593821
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www-01.ibm.com/support/docview.wss?uid=swg21678231
http://www-01.ibm.com/support/docview.wss?uid=swg21681528
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052
http://www.mandriva.com/security/advisories?name=MDVSA-2015:053
http://www.mandriva.com/security/advisories?name=MDVSA-2015:084
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
http://www.securityfocus.com/archive/1/534161/100/0/threaded
http://www.securityfocus.com/bid/67669
http://www.securitytracker.com/id/1030298
http://www.ubuntu.com/usn/USN-2654-1
http://www.vmware.com/security/advisories/VMSA-2014-0012.html
https://access.redhat.com/security/cve/CVE-2014-0119
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0119
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/080878ea519d8c74c53721a9ebf7be6fcf6f1f2f
https://github.com/apache/tomcat/commit/50311bed8d87e452ff0e69838ba312c4fe899b2d
https://github.com/apache/tomcat/commit/5517c5517e8a7ddb994504f0c5c05001a376b10c
https://github.com/apache/tomcat/commit/5aae1323c31d643afa9f2db80713b8e97b5123af
https://github.com/apache/tomcat/commit/6246d8307fb5f2b4ff0b0f4d6d1b0250dff01a81
https://github.com/apache/tomcat/commit/769477b9bc8442db3f571385fa0c3e206242cbf1
https://github.com/apache/tomcat/commit/934f884f330dad192d2c5dc950e28f4cd281461b
https://github.com/apache/tomcat/commit/ad3b34a290a0255d2a4c356a3611ab41ed9d04f5
https://github.com/apache/tomcat/commit/ce70ee6b8fe437a498a375215011056702b0c481
https://github.com/apache/tomcat/commit/ebe5c16f18ce1559e8462a94b3876a98525980d2
https://github.com/apache/tomcat/commit/f8b316acbbf9fabf87cc137e9777e912eda0d834
https://github.com/apache/tomcat80/commit/25251de791a6a7be13f2f3d3a66119a77025272d
https://github.com/apache/tomcat80/commit/4d90e355dc5ced4c53585c2b4700f71a52d8f447
https://github.com/apache/tomcat80/commit/51e59532ad4c604f55575963dc7a7f0250cb420f
https://github.com/apache/tomcat80/commit/69a8a72283c3395ece8b899cf8562e126de97a27
https://github.com/apache/tomcat80/commit/77e014cef5d5af619bcf77eaebf22c284d420802
https://github.com/apache/tomcat80/commit/7d33457de5fc5a652a88fb9bbc9ba4cbbda58f04
https://github.com/apache/tomcat80/commit/d59fd4398c8ae6361e0b13c491f66b51e49a7441
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://linux.oracle.com/cve/CVE-2014-0119.html
https://linux.oracle.com/errata/ELSA-2014-1038.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0119
https://ubuntu.com/security/notices/USN-2654-1
https://www.cve.org/CVERecord?id=CVE-2014-0119
|
| tomcat-servlet-3.0-api |
CVE-2014-0230 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://mail-archives.apache.org/mod_mbox/tomcat-announce/201505.mbox/%3C554949D1.8030904%40apache.org%3E
http://marc.info/?l=bugtraq&m=144498216801440&w=2
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://openwall.com/lists/oss-security/2015/04/10/1
http://rhn.redhat.com/errata/RHSA-2015-1621.html
http://rhn.redhat.com/errata/RHSA-2015-1622.html
http://rhn.redhat.com/errata/RHSA-2015-2661.html
http://rhn.redhat.com/errata/RHSA-2016-0595.html
http://rhn.redhat.com/errata/RHSA-2016-0596.html
http://rhn.redhat.com/errata/RHSA-2016-0597.html
http://rhn.redhat.com/errata/RHSA-2016-0598.html
http://rhn.redhat.com/errata/RHSA-2016-0599.html
http://svn.apache.org/viewvc?view=revision&revision=1603770
http://svn.apache.org/viewvc?view=revision&revision=1603775
http://svn.apache.org/viewvc?view=revision&revision=1603779
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.44
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.55
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.9
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.securityfocus.com/bid/74475
http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1
https://access.redhat.com/errata/RHSA-2015:2659
https://access.redhat.com/errata/RHSA-2015:2660
https://access.redhat.com/security/cve/CVE-2014-0230
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0230
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6b2cfacf749be186ea77249a979af1d4863e47ba
https://github.com/apache/tomcat/commit/812088583d0e60717a8fe9c6d14e12bcdc3e6c51
https://github.com/apache/tomcat/commit/b1c8477e3e3ee635d19cc4d5987c2b157431e0c1
https://github.com/apache/tomcat/commit/c1357e649641844109711d60cacb98e4b5fcd3cb
https://github.com/apache/tomcat/commit/e28dd578fad90a6d5726ec34f3245c9f99d909a5
https://github.com/apache/tomcat/commit/e3146f4b03a2386c3e57597e86134d4ed5c31303
https://github.com/apache/tomcat/commit/fc049912464f0dcf9dede3761f38049369057e16
https://github.com/apache/tomcat/commit/fdd9f11dc24b95e5425076abb58e968336f320a2
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://issues.jboss.org/browse/JWS-219
https://issues.jboss.org/browse/JWS-220
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-0230
https://ubuntu.com/security/notices/USN-2654-1
https://ubuntu.com/security/notices/USN-2655-1
https://www.cve.org/CVERecord?id=CVE-2014-0230
|
| tomcat-servlet-3.0-api |
CVE-2015-5174 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://packetstormsecurity.com/files/135883/Apache-Tomcat-Limited-Directory-Traversal.html
http://rhn.redhat.com/errata/RHSA-2016-1435.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://seclists.org/bugtraq/2016/Feb/149
http://svn.apache.org/viewvc?view=revision&revision=1696281
http://svn.apache.org/viewvc?view=revision&revision=1696284
http://svn.apache.org/viewvc?view=revision&revision=1700897
http://svn.apache.org/viewvc?view=revision&revision=1700898
http://svn.apache.org/viewvc?view=revision&revision=1700900
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83329
http://www.securitytracker.com/id/1035070
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1432
https://access.redhat.com/errata/RHSA-2016:1433
https://access.redhat.com/errata/RHSA-2016:1434
https://access.redhat.com/security/cve/CVE-2015-5174
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5174.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r0b24f2c7507f702348e2c2d64e8a5de72bad6173658e8d8e45322ac2%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r0b24f2c7507f702348e2c2d64e8a5de72bad6173658e8d8e45322ac2@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r15695e6203b026c9e9070ca9fa95fb17dd4cd88e5342a7dc5e1e7b85@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r1c62634b7426bee5f553307063457b99c84af73b078ede4f2592b34e@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r409efdf706c2077ae5c37018a87da725a3ca89570a9530342cdc53e4@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd4863c79bf729aabb95571fd845a9ea4ee3ae3fcee48f35aba007350%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd4863c79bf729aabb95571fd845a9ea4ee3ae3fcee48f35aba007350@%3Cusers.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5174
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://www.cve.org/CVERecord?id=CVE-2015-5174
|
| tomcat-servlet-3.0-api |
CVE-2015-5345 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://packetstormsecurity.com/files/135892/Apache-Tomcat-Directory-Disclosure.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://seclists.org/bugtraq/2016/Feb/146
http://seclists.org/fulldisclosure/2016/Feb/122
http://svn.apache.org/viewvc?view=revision&revision=1715206
http://svn.apache.org/viewvc?view=revision&revision=1715207
http://svn.apache.org/viewvc?view=revision&revision=1715213
http://svn.apache.org/viewvc?view=revision&revision=1715216
http://svn.apache.org/viewvc?view=revision&revision=1716882
http://svn.apache.org/viewvc?view=revision&revision=1716894
http://svn.apache.org/viewvc?view=revision&revision=1717209
http://svn.apache.org/viewvc?view=revision&revision=1717212
http://svn.apache.org/viewvc?view=revision&revision=1717216
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.qcsec.com/blog/CVE-2015-5345-apache-tomcat-vulnerability.html
http://www.securityfocus.com/bid/83328
http://www.securitytracker.com/id/1035071
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5345
https://bto.bluecoat.com/security-advisory/sa118
https://bz.apache.org/bugzilla/show_bug.cgi?id=58765
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/127d8ea86d245846f0472865f0eb1eb111955e71
https://github.com/apache/tomcat/commit/58c09b6217c546e1a251a82da227018f05277228
https://github.com/apache/tomcat/commit/66daa4adc14b3e939659879153c0a579fdfcb099
https://github.com/apache/tomcat/commit/7288bc70a14edcfeff0a96e333a858be374cfc64
https://github.com/apache/tomcat/commit/816552abf6735fa37dfd37c8a7bfbdbd045477e0
https://github.com/apache/tomcat/commit/8437193708e4bf6b2861a7953dc472f9dad49111
https://github.com/apache/tomcat/commit/89cd0cf33a99dbbcf5c69050a83b6876e39269d7
https://github.com/apache/tomcat/commit/a273b5f45cb46a273d06510a689fc314155a952d
https://github.com/apache/tomcat/commit/c584c7c4ab0686e4125eefcd0afb32fb8269da3d
https://github.com/apache/tomcat80/commit/2b643a4e36d318d55ec57fee57610671656d23c0
https://github.com/apache/tomcat80/commit/c15c2aba8eb42425f9ebcfcaef579dada38ad3a2
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://kc.mcafee.com/corporate/index?page=content&id=SB10156
https://linux.oracle.com/cve/CVE-2015-5345.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5345
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321235514/http://www.securitytracker.com/id/1035071
https://web.archive.org/web/20160804024910/http://www.securityfocus.com/bid/83328
https://www.cve.org/CVERecord?id=CVE-2015-5345
|
| tomcat-servlet-3.0-api |
CVE-2015-5346 |
LOW |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://packetstormsecurity.com/files/135890/Apache-Tomcat-Session-Fixation.html
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/143
http://svn.apache.org/viewvc?view=revision&revision=1713184
http://svn.apache.org/viewvc?view=revision&revision=1713185
http://svn.apache.org/viewvc?view=revision&revision=1713187
http://svn.apache.org/viewvc?view=revision&revision=1723414
http://svn.apache.org/viewvc?view=revision&revision=1723506
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83323
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2015-5346
https://bto.bluecoat.com/security-advisory/sa118
https://bz.apache.org/bugzilla/show_bug.cgi?id=58809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/04164c1f01b973e548d95511d417f414ca723cb8
https://github.com/apache/tomcat/commit/6287be37d8d06c320215c45f7e2b8380411692e0
https://github.com/apache/tomcat/commit/83679b99cd40caa401d173c8f8e72fc98eb5d5be
https://github.com/apache/tomcat80/commit/41fbee7ba15435a831f765597ff907c56ebf2169
https://github.com/apache/tomcat80/commit/c39b7ffc2145644f7f3cf9e3cd4aada5048e56a0
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2015-5346.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2015-5346
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://web.archive.org/web/20160912063818/http://www.securityfocus.com/bid/83323
https://www.cve.org/CVERecord?id=CVE-2015-5346
|
| tomcat-servlet-3.0-api |
CVE-2016-0706 |
LOW |
7.0.42-4.el7 |
7.0.69-10.el7 |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
http://marc.info/?l=bugtraq&m=145974991225029&w=2
http://rhn.redhat.com/errata/RHSA-2016-1089.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2599.html
http://rhn.redhat.com/errata/RHSA-2016-2807.html
http://rhn.redhat.com/errata/RHSA-2016-2808.html
http://seclists.org/bugtraq/2016/Feb/144
http://svn.apache.org/viewvc?view=revision&revision=1722799
http://svn.apache.org/viewvc?view=revision&revision=1722800
http://svn.apache.org/viewvc?view=revision&revision=1722801
http://svn.apache.org/viewvc?view=revision&revision=1722802
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://tomcat.apache.org/security-9.html
http://www.debian.org/security/2016/dsa-3530
http://www.debian.org/security/2016/dsa-3552
http://www.debian.org/security/2016/dsa-3609
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/83324
http://www.securitytracker.com/id/1035069
http://www.ubuntu.com/usn/USN-3024-1
https://access.redhat.com/errata/RHSA-2016:1087
https://access.redhat.com/errata/RHSA-2016:1088
https://access.redhat.com/security/cve/CVE-2016-0706
https://bto.bluecoat.com/security-advisory/sa118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706
https://github.com/apache/tomcat
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
https://linux.oracle.com/cve/CVE-2016-0706.html
https://linux.oracle.com/errata/ELSA-2016-2599.html
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0706
https://security.gentoo.org/glsa/201705-09
https://security.netapp.com/advisory/ntap-20180531-0001
https://security.netapp.com/advisory/ntap-20180531-0001/
https://ubuntu.com/security/notices/USN-3024-1
https://web.archive.org/web/20160226210040/http://www.securityfocus.com/bid/83324
https://web.archive.org/web/20160321234551/http://www.securitytracker.com/id/1035069
https://www.cve.org/CVERecord?id=CVE-2016-0706
|
| tomcat-servlet-3.0-api |
CVE-2016-0762 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/pzuk6hauzljnm4r7?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93939
http://www.securitytracker.com/id/1037144
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-0762
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0762
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/86b2e436099cb48f30dad950175c5beeeb763756
https://github.com/apache/tomcat/commit/970e615c7ade6ec6c341470bbc76aa1256353737
https://github.com/apache/tomcat/commit/d79c63d424fe6b225678416343b9ce106dec947c
https://github.com/apache/tomcat80/commit/dc4c3317452f0bc2c5e1f6a08d3bd9f22488b450
https://linux.oracle.com/cve/CVE-2016-0762.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/1872f96bad43647832bdd84a408794cd06d9cbb557af63085ca10009%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1872f96bad43647832bdd84a408794cd06d9cbb557af63085ca10009@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-0762
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://www.cve.org/CVERecord?id=CVE-2016-0762
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-servlet-3.0-api |
CVE-2016-5018 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/lixw6iyojoxwfizv?q=list:org.apache.tomcat.announce/
http://packetstormsecurity.com/files/155873/Tomcat-9.0.0.M1-Sandbox-Escape.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-1551.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93942
http://www.securitytracker.com/id/1037142
http://www.securitytracker.com/id/1038757
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:1548
https://access.redhat.com/errata/RHSA-2017:1549
https://access.redhat.com/errata/RHSA-2017:1550
https://access.redhat.com/errata/RHSA-2017:1552
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-5018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5018
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/648122fef84d3b43223e0b5ae668f84719dada0a
https://github.com/apache/tomcat/commit/890a2f681ed2f3461b27983d7da9737375ff2ae4
https://github.com/apache/tomcat/commit/a6b1ebc246b91b854237e5aad3dfd2b5460ea282
https://linux.oracle.com/cve/CVE-2016-5018.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9b3a63a20c87179815fdea14f6766853bafe79a0042dc0b4aa878a9e%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9b3a63a20c87179815fdea14f6766853bafe79a0042dc0b4aa878a9e@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-5018
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161125134649/http://www.securityfocus.com/bid/93942
https://web.archive.org/web/20170908024318/http://www.securitytracker.com/id/1037142
https://web.archive.org/web/20171012232225/http://www.securitytracker.com/id/1038757
https://www.cve.org/CVERecord?id=CVE-2016-5018
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-servlet-3.0-api |
CVE-2016-6325 |
LOW |
7.0.42-4.el7 |
7.0.54-8.el7_2 |
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93478
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/security/cve/CVE-2016-6325
https://bugzilla.redhat.com/show_bug.cgi?id=1367447
https://linux.oracle.com/cve/CVE-2016-6325.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://nvd.nist.gov/vuln/detail/CVE-2016-6325
https://www.cve.org/CVERecord?id=CVE-2016-6325
|
| tomcat-servlet-3.0-api |
CVE-2016-6794 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/zk7w6yly5mviocci?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93943
http://www.securitytracker.com/id/1037143
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6794
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0b41766456b1980e4f809e13ad6dc9fa912bae7e
https://github.com/apache/tomcat/commit/c1660182010b4255c21c874d69c124370a67784a
https://github.com/apache/tomcat/commit/f8db078f1e6e8b225f8344e63595113ca34cd408
https://github.com/apache/tomcat80/commit/ae6163a4f230bc679abfc93e048ff92996badad6
https://linux.oracle.com/cve/CVE-2016-6794.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/09d2f2c65ac4ff5da42f15dc2b0f78b655e50f1a42e8a9784134a9eb%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/09d2f2c65ac4ff5da42f15dc2b0f78b655e50f1a42e8a9784134a9eb@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6794
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20170317100547/http://www.securitytracker.com/id/1037143
https://web.archive.org/web/20170626130744/http://www.securityfocus.com/bid/93943
https://www.cve.org/CVERecord?id=CVE-2016-6794
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-servlet-3.0-api |
CVE-2016-6796 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/hynaeawxxhpvvctu?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-1551.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93944
http://www.securitytracker.com/id/1037141
http://www.securitytracker.com/id/1038757
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:1548
https://access.redhat.com/errata/RHSA-2017:1549
https://access.redhat.com/errata/RHSA-2017:1550
https://access.redhat.com/errata/RHSA-2017:1552
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/f603f2f4595073f9490e01699d2083112a7c09a7
https://github.com/apache/tomcat/commit/f97769f50ee2613e1bf27107a01d48907fd993ac
https://github.com/apache/tomcat/commit/ffa0346fba2946401630291b642f1cff66d6a2be
https://github.com/apache/tomcat80/commit/d98fa92b9dfc90fe1ffdaa3cce1be3be84532260
https://linux.oracle.com/cve/CVE-2016-6796.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5a2105a56b2495ab70fa568f06925bd861f0d71ffab4fb38bb4fdc45%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5a2105a56b2495ab70fa568f06925bd861f0d71ffab4fb38bb4fdc45@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6796
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161029105733/http://www.securityfocus.com/bid/93944
https://web.archive.org/web/20161103080055/http://www.securitytracker.com/id/1037141
https://web.archive.org/web/20171012232225/http://www.securitytracker.com/id/1038757
https://www.cve.org/CVERecord?id=CVE-2016-6796
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-servlet-3.0-api |
CVE-2016-6797 |
LOW |
7.0.42-4.el7 |
7.0.76-2.el7 |
http://markmail.org/message/wrku5orwxfpt5mzl?q=list:org.apache.tomcat.announce/
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://www.debian.org/security/2016/dsa-3720
http://www.securityfocus.com/bid/93940
http://www.securitytracker.com/id/1037145
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:2247
https://access.redhat.com/security/cve/CVE-2016-6797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2859ac3eae132383cb6f3f2042e25d7a4a281b0d
https://github.com/apache/tomcat/commit/b3406e6c318378cbf440f902f9fdbb8b440aef4e
https://github.com/apache/tomcat/commit/d6b5600afe75e1086dd564344e1d085966e4237d
https://github.com/apache/tomcat80/commit/824c7dc781056442046db0ae34bcf1497f23f44c
https://linux.oracle.com/cve/CVE-2016-6797.html
https://linux.oracle.com/errata/ELSA-2017-2247.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9325837eb00cba5752c092047433c7f0415134d16e7f391447ff4352%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/9325837eb00cba5752c092047433c7f0415134d16e7f391447ff4352@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6797
https://security.netapp.com/advisory/ntap-20180605-0001
https://security.netapp.com/advisory/ntap-20180605-0001/
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20170320064509/http://www.securitytracker.com/id/1037145
https://web.archive.org/web/20170423095945/http://www.securityfocus.com/bid/93940
https://www.cve.org/CVERecord?id=CVE-2016-6797
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-servlet-3.0-api |
CVE-2018-8034 |
LOW |
7.0.42-4.el7 |
7.0.76-9.el7 |
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283%40minotaur.apache.org%3E
http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722091057.GA70283@minotaur.apache.org%3E
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/104895
http://www.securitytracker.com/id/1041374
https://access.redhat.com/errata/RHSA-2019:0130
https://access.redhat.com/errata/RHSA-2019:0131
https://access.redhat.com/errata/RHSA-2019:0450
https://access.redhat.com/errata/RHSA-2019:0451
https://access.redhat.com/errata/RHSA-2019:1159
https://access.redhat.com/errata/RHSA-2019:1160
https://access.redhat.com/errata/RHSA-2019:1161
https://access.redhat.com/errata/RHSA-2019:1162
https://access.redhat.com/errata/RHSA-2019:1529
https://access.redhat.com/errata/RHSA-2019:2205
https://access.redhat.com/errata/RHSA-2019:3892
https://access.redhat.com/security/cve/CVE-2018-8034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8034
https://errata.almalinux.org/8/ALSA-2019-1529.html
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/2835bb4e030c1c741ed0847bb3b9c3822e4fbc8a
https://github.com/apache/tomcat/commit/2c522795166c930741a9cecca76797bf48cb1634
https://linux.oracle.com/cve/CVE-2018-8034.html
https://linux.oracle.com/errata/ELSA-2019-2205.html
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/07/msg00047.html
https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2018-8034
https://security.netapp.com/advisory/ntap-20180817-0001
https://security.netapp.com/advisory/ntap-20180817-0001/
https://ubuntu.com/security/notices/USN-3723-1
https://usn.ubuntu.com/3723-1
https://usn.ubuntu.com/3723-1/
https://web.archive.org/web/20200227102810/http://www.securityfocus.com/bid/104895
https://web.archive.org/web/20200517032514/http://www.securitytracker.com/id/1041374
https://www.cve.org/CVERecord?id=CVE-2018-8034
https://www.debian.org/security/2018/dsa-4281
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| tomcat-servlet-3.0-api |
CVE-2019-0221 |
LOW |
7.0.42-4.el7 |
|
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html
http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2019/May/50
http://www.securityfocus.com/bid/108545
https://access.redhat.com/errata/RHSA-2019:3929
https://access.redhat.com/errata/RHSA-2019:3931
https://access.redhat.com/security/cve/CVE-2019-0221
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0221
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/15fcd166ea2c1bb79e8541b8e1a43da9c452ceea
https://github.com/apache/tomcat/commit/44ec74c44dcd05cd7e90967c04d40b51440ecd7e
https://github.com/apache/tomcat/commit/4fcdf706f3ecf35912a600242f89637f5acb32da
https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46
https://mail-archives.apache.org/mod_mbox/www-announce/201905.mbox/%3Cb1905aa6-f340-8d0b-58c4-8ac3ebcbfa54@apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2019-0221
https://seclists.org/bugtraq/2019/Dec/43
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20190606-0001
https://security.netapp.com/advisory/ntap-20190606-0001/
https://support.f5.com/csp/article/K13184144?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K13184144?utm_source=f5support&utm_medium=RSS
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4128-1
https://ubuntu.com/security/notices/USN-4128-2
https://usn.ubuntu.com/4128-1
https://usn.ubuntu.com/4128-1/
https://usn.ubuntu.com/4128-2
https://usn.ubuntu.com/4128-2/
https://web.archive.org/web/20200227055048/http://www.securityfocus.com/bid/108545
https://www.cve.org/CVERecord?id=CVE-2019-0221
https://www.debian.org/security/2019/dsa-4596
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221
https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/
|
| tomcat-servlet-3.0-api |
CVE-2019-17563 |
LOW |
7.0.42-4.el7 |
7.0.76-15.el7 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html
http://mail-archives.apache.org/mod_mbox/www-announce/201912.mbox/%3C21b7a375-7297-581b-1f8e-06622d36775b@apache.org%3E
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.30
https://access.redhat.com/security/cve/CVE-2019-17563
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17563
https://github.com/apache/tomcat
https://linux.oracle.com/cve/CVE-2019-17563.html
https://linux.oracle.com/errata/ELSA-2020-4004.html
https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e%40%3Cissues.cxf.apache.org%3E
https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2019-17563
https://seclists.org/bugtraq/2019/Dec/43
https://security.gentoo.org/glsa/202003-43
https://security.netapp.com/advisory/ntap-20200107-0001
https://security.netapp.com/advisory/ntap-20200107-0001/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.99
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.50
https://ubuntu.com/security/notices/USN-4251-1
https://usn.ubuntu.com/4251-1
https://usn.ubuntu.com/4251-1/
https://www.cve.org/CVERecord?id=CVE-2019-17563
https://www.debian.org/security/2019/dsa-4596
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
|
| tomcat-servlet-3.0-api |
CVE-2020-1935 |
LOW |
7.0.42-4.el7 |
7.0.76-16.el7_9 |
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
https://access.redhat.com/security/cve/CVE-2020-1935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1935
https://linux.oracle.com/cve/CVE-2020-1935.html
https://linux.oracle.com/errata/ELSA-2020-5020.html
https://lists.apache.org/thread.html/r127f76181aceffea2bd4711b03c595d0f115f63e020348fe925a916c%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r441c1f30a252bf14b07396286f6abd8089ce4240e91323211f1a2d75@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r660cd379afe346f10d72c0eaa8459ccc95d83aff181671b7e9076919@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r80e9c8417c77d52c62809168b96912bda70ddf7748f19f8210f745b1@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9ce7918faf347e7aac32be930bf26c233b0b140fe37af0bb294158b6@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/ra5dee390ad2d60307b8362505c059cd6a726de4d146d63dfce1e05e7@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rd547be0c9d821b4b1000a694b8e58ef9f5e2d66db03a31dfe77c4b18@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2020-1935
https://security.netapp.com/advisory/ntap-20200327-0005
https://security.netapp.com/advisory/ntap-20200327-0005/
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31
https://ubuntu.com/security/notices/USN-4448-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://www.cve.org/CVERecord?id=CVE-2020-1935
https://www.debian.org/security/2020/dsa-4673
https://www.debian.org/security/2020/dsa-4680
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
|
| tomcat-servlet-3.0-api |
CVE-2021-25329 |
LOW |
7.0.42-4.el7 |
|
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3C811bba77-e74e-9f9b-62ca-5253a09ba84f%40apache.org%3E
http://www.openwall.com/lists/oss-security/2021/03/01/2
https://access.redhat.com/security/cve/CVE-2021-25329
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25329
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html
https://nvd.nist.gov/vuln/detail/CVE-2021-25329
https://security.gentoo.org/glsa/202208-34
https://security.netapp.com/advisory/ntap-20210409-0002
https://security.netapp.com/advisory/ntap-20210409-0002/
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.108
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43
https://ubuntu.com/security/notices/USN-5360-1
https://www.cve.org/CVERecord?id=CVE-2021-25329
https://www.debian.org/security/2021/dsa-4891
https://www.openwall.com/lists/oss-security/2021/03/01/2
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tomcat-servlet-3.0-api |
CVE-2022-29885 |
LOW |
7.0.42-4.el7 |
|
http://packetstormsecurity.com/files/171728/Apache-Tomcat-10.1-Denial-Of-Service.html
https://access.redhat.com/security/cve/CVE-2022-29885
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0fa7721f11d565a2cd2e44366c388ad6a3e6357d
https://github.com/apache/tomcat/commit/36826ea638457d7e17876a70f89cb435b6db0d91
https://github.com/apache/tomcat/commit/b679bc627f5a4ea6510af95adfb7476b07eba890
https://github.com/apache/tomcat/commit/eaafd28296c54d983e28a47953c1f5cb2c334f48
https://lists.apache.org/thread/2b4qmhbcyqvc7dyfpjyx54c03x65vhcv
https://lists.debian.org/debian-lts-announce/2022/10/msg00029.html
https://nvd.nist.gov/vuln/detail/CVE-2022-29885
https://security.netapp.com/advisory/ntap-20220629-0002
https://security.netapp.com/advisory/ntap-20220629-0002/
https://www.cve.org/CVERecord?id=CVE-2022-29885
https://www.debian.org/security/2022/dsa-5265
https://www.oracle.com/security-alerts/cpujul2022.html
|
| tomcat-servlet-3.0-api |
CVE-2022-4132 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-4132
https://bugzilla.redhat.com/show_bug.cgi?id=2147372
https://nvd.nist.gov/vuln/detail/CVE-2022-4132
https://www.cve.org/CVERecord?id=CVE-2022-4132
|
| tomcat-servlet-3.0-api |
CVE-2022-42252 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-42252
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0d089a15047faf9cb3c82f80f4d28febd4798920
https://github.com/apache/tomcat/commit/4c7f4fd09d2cc1692112ef70b8ee23a7a037ae77
https://github.com/apache/tomcat/commit/a1c07906d8dcaf7957e5cc97f5cdbac7d18a205a
https://github.com/apache/tomcat/commit/c9fe754e5d17e262dfbd3eab2a03ca96ff372dc3
https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq
https://nvd.nist.gov/vuln/detail/CVE-2022-42252
https://security.gentoo.org/glsa/202305-37
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://www.cve.org/CVERecord?id=CVE-2022-42252
|
| tomcat-servlet-3.0-api |
CVE-2022-45143 |
LOW |
7.0.42-4.el7 |
|
https://access.redhat.com/security/cve/CVE-2022-45143
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/0cab3a56bd89f70e7481bb0d68395dc7e130dbbf
https://github.com/apache/tomcat/commit/6a0ac6a438cbbb66b6e9c5223842f53bf0cb50aa
https://github.com/apache/tomcat/commit/b336f4e58893ea35114f1e4a415657f723b1298e
https://lists.apache.org/thread/yqkd183xrw3wqvnpcg3osbcryq85fkzj
https://nvd.nist.gov/vuln/detail/CVE-2022-45143
https://security.gentoo.org/glsa/202305-37
https://www.cve.org/CVERecord?id=CVE-2022-45143
|
| trousers |
CVE-2020-24331 |
MEDIUM |
0.3.14-2.el7 |
|
http://www.openwall.com/lists/oss-security/2020/08/14/1
https://access.redhat.com/security/cve/CVE-2020-24331
https://bugzilla.redhat.com/show_bug.cgi?id=1870052
https://bugzilla.redhat.com/show_bug.cgi?id=1870054
https://bugzilla.redhat.com/show_bug.cgi?id=1870056
https://bugzilla.suse.com/show_bug.cgi?id=1164472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24332
https://errata.almalinux.org/8/ALSA-2021-1627.html
https://errata.rockylinux.org/RLSA-2021:1627
https://linux.oracle.com/cve/CVE-2020-24331.html
https://linux.oracle.com/errata/ELSA-2021-1627.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SSDL7COIFCZQMUBNAASNMKMX7W5JUHRD/
https://nvd.nist.gov/vuln/detail/CVE-2020-24331
https://seclists.org/oss-sec/2020/q2/att-135/tcsd_fixes.patch
https://sourceforge.net/p/trousers/mailman/message/37015817/
https://www.cve.org/CVERecord?id=CVE-2020-24331
https://www.openwall.com/lists/oss-security/2020/08/14/1
|
| trousers |
CVE-2020-24332 |
MEDIUM |
0.3.14-2.el7 |
|
http://www.openwall.com/lists/oss-security/2020/08/14/1
https://access.redhat.com/security/cve/CVE-2020-24332
https://bugzilla.redhat.com/show_bug.cgi?id=1870052
https://bugzilla.redhat.com/show_bug.cgi?id=1870054
https://bugzilla.redhat.com/show_bug.cgi?id=1870056
https://bugzilla.suse.com/show_bug.cgi?id=1164472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24332
https://errata.almalinux.org/8/ALSA-2021-1627.html
https://errata.rockylinux.org/RLSA-2021:1627
https://linux.oracle.com/cve/CVE-2020-24332.html
https://linux.oracle.com/errata/ELSA-2021-1627.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SSDL7COIFCZQMUBNAASNMKMX7W5JUHRD/
https://nvd.nist.gov/vuln/detail/CVE-2020-24332
https://seclists.org/oss-sec/2020/q2/att-135/tcsd_fixes.patch
https://sourceforge.net/p/trousers/mailman/message/37015817/
https://www.cve.org/CVERecord?id=CVE-2020-24332
https://www.openwall.com/lists/oss-security/2020/08/14/1
|
| trousers |
CVE-2020-24330 |
LOW |
0.3.14-2.el7 |
|
http://www.openwall.com/lists/oss-security/2020/08/14/1
https://access.redhat.com/security/cve/CVE-2020-24330
https://bugzilla.redhat.com/show_bug.cgi?id=1870052
https://bugzilla.redhat.com/show_bug.cgi?id=1870054
https://bugzilla.redhat.com/show_bug.cgi?id=1870056
https://bugzilla.suse.com/show_bug.cgi?id=1164472
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24331
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24332
https://errata.almalinux.org/8/ALSA-2021-1627.html
https://errata.rockylinux.org/RLSA-2021:1627
https://linux.oracle.com/cve/CVE-2020-24330.html
https://linux.oracle.com/errata/ELSA-2021-1627.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SSDL7COIFCZQMUBNAASNMKMX7W5JUHRD/
https://nvd.nist.gov/vuln/detail/CVE-2020-24330
https://seclists.org/oss-sec/2020/q2/att-135/tcsd_fixes.patch
https://sourceforge.net/p/trousers/mailman/message/37015817/
https://www.cve.org/CVERecord?id=CVE-2020-24330
https://www.openwall.com/lists/oss-security/2020/08/14/1
|
| unbound-libs |
CVE-2023-50387 |
HIGH |
1.6.6-5.el7_8 |
|
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:0977
https://access.redhat.com/security/cve/CVE-2023-50387
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219823
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/9/ALSA-2024-0977.html
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50387
https://linux.oracle.com/cve/CVE-2023-50387.html
https://linux.oracle.com/errata/ELSA-2024-0977.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
https://news.ycombinator.com/item?id=39367411
https://news.ycombinator.com/item?id=39372384
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50387
https://security.netapp.com/advisory/ntap-20240307-0007/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6665-1
https://www.athene-center.de/aktuelles/key-trap
https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
https://www.cve.org/CVERecord?id=CVE-2023-50387
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
|
| unbound-libs |
CVE-2023-50868 |
HIGH |
1.6.6-5.el7_8 |
|
http://www.openwall.com/lists/oss-security/2024/02/16/2
http://www.openwall.com/lists/oss-security/2024/02/16/3
https://access.redhat.com/errata/RHSA-2024:0977
https://access.redhat.com/security/cve/CVE-2023-50868
https://blog.powerdns.com/2024/02/13/powerdns-recursor-4-8-6-4-9-3-5-0-2-released
https://bugzilla.redhat.com/2263914
https://bugzilla.redhat.com/2263917
https://bugzilla.suse.com/show_bug.cgi?id=1219826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868
https://datatracker.ietf.org/doc/html/rfc5155
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
https://errata.almalinux.org/9/ALSA-2024-0977.html
https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
https://kb.isc.org/docs/cve-2023-50868
https://linux.oracle.com/cve/CVE-2023-50868.html
https://linux.oracle.com/errata/ELSA-2024-0977.html
https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
https://nlnetlabs.nl/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt
https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
https://nvd.nist.gov/vuln/detail/CVE-2023-50868
https://security.netapp.com/advisory/ntap-20240307-0008/
https://ubuntu.com/security/notices/USN-6633-1
https://ubuntu.com/security/notices/USN-6642-1
https://ubuntu.com/security/notices/USN-6657-1
https://ubuntu.com/security/notices/USN-6665-1
https://www.cve.org/CVERecord?id=CVE-2023-50868
https://www.isc.org/blogs/2024-bind-security-release/
https://www.knot-resolver.cz/2024-02-13-knot-resolver-5.7.1.html
|
| unbound-libs |
CVE-2017-15105 |
MEDIUM |
1.6.6-5.el7_8 |
|
http://www.securityfocus.com/bid/102817
https://access.redhat.com/security/cve/CVE-2017-15105
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15105
https://lists.debian.org/debian-lts-announce/2018/01/msg00039.html
https://lists.debian.org/debian-lts-announce/2019/02/msg00022.html
https://nvd.nist.gov/vuln/detail/CVE-2017-15105
https://ubuntu.com/security/notices/USN-3673-1
https://unbound.net/downloads/CVE-2017-15105.txt
https://usn.ubuntu.com/3673-1/
https://www.cve.org/CVERecord?id=CVE-2017-15105
|
| unbound-libs |
CVE-2019-18934 |
MEDIUM |
1.6.6-5.el7_8 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html
http://www.openwall.com/lists/oss-security/2019/11/19/1
https://access.redhat.com/security/cve/CVE-2019-18934
https://github.com/NLnetLabs/unbound/blob/release-1.9.5/doc/Changelog
https://linux.oracle.com/cve/CVE-2019-18934.html
https://linux.oracle.com/errata/ELSA-2020-1716.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MOCR6JP7MSRARTOGEHGST64G4FJGX5VK/
https://nlnetlabs.nl/downloads/unbound/CVE-2019-18934.txt
https://nvd.nist.gov/vuln/detail/CVE-2019-18934
https://www.cve.org/CVERecord?id=CVE-2019-18934
https://www.nlnetlabs.nl/downloads/unbound/CVE-2019-18934.txt
https://www.nlnetlabs.nl/news/2019/Nov/19/unbound-1.9.5-released/
|
| unbound-libs |
CVE-2019-25032 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/security/cve/CVE-2019-25032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25032
https://linux.oracle.com/cve/CVE-2019-25032.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2019-25032
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
https://www.cve.org/CVERecord?id=CVE-2019-25032
|
| unbound-libs |
CVE-2019-25033 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/security/cve/CVE-2019-25033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25033
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2019-25033
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
https://www.cve.org/CVERecord?id=CVE-2019-25033
|
| unbound-libs |
CVE-2019-25034 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/security/cve/CVE-2019-25034
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25034
https://linux.oracle.com/cve/CVE-2019-25034.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2019-25034
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
https://www.cve.org/CVERecord?id=CVE-2019-25034
|
| unbound-libs |
CVE-2019-25035 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/security/cve/CVE-2019-25035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25035
https://linux.oracle.com/cve/CVE-2019-25035.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2019-25035
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
https://www.cve.org/CVERecord?id=CVE-2019-25035
|
| unbound-libs |
CVE-2019-25036 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/security/cve/CVE-2019-25036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25036
https://linux.oracle.com/cve/CVE-2019-25036.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2019-25036
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
https://www.cve.org/CVERecord?id=CVE-2019-25036
|
| unbound-libs |
CVE-2019-25037 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/security/cve/CVE-2019-25037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25037
https://linux.oracle.com/cve/CVE-2019-25037.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2019-25037
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
https://www.cve.org/CVERecord?id=CVE-2019-25037
|
| unbound-libs |
CVE-2019-25038 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/security/cve/CVE-2019-25038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25038
https://linux.oracle.com/cve/CVE-2019-25038.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2019-25038
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
https://www.cve.org/CVERecord?id=CVE-2019-25038
|
| unbound-libs |
CVE-2019-25039 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/security/cve/CVE-2019-25039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25039
https://linux.oracle.com/cve/CVE-2019-25039.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2019-25039
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
https://www.cve.org/CVERecord?id=CVE-2019-25039
|
| unbound-libs |
CVE-2019-25040 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/security/cve/CVE-2019-25040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25040
https://linux.oracle.com/cve/CVE-2019-25040.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2019-25040
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
https://www.cve.org/CVERecord?id=CVE-2019-25040
|
| unbound-libs |
CVE-2019-25041 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/security/cve/CVE-2019-25041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25041
https://linux.oracle.com/cve/CVE-2019-25041.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2019-25041
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
https://www.cve.org/CVERecord?id=CVE-2019-25041
|
| unbound-libs |
CVE-2019-25042 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/security/cve/CVE-2019-25042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25042
https://linux.oracle.com/cve/CVE-2019-25042.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html
https://nvd.nist.gov/vuln/detail/CVE-2019-25042
https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
https://security.netapp.com/advisory/ntap-20210507-0007/
https://ubuntu.com/security/notices/USN-4938-1
https://www.cve.org/CVERecord?id=CVE-2019-25042
|
| unbound-libs |
CVE-2022-30698 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/errata/RHSA-2022:8062
https://access.redhat.com/security/cve/CVE-2022-30698
https://bugzilla.redhat.com/2116725
https://bugzilla.redhat.com/2116729
https://bugzilla.redhat.com/show_bug.cgi?id=1981415
https://bugzilla.redhat.com/show_bug.cgi?id=2056116
https://bugzilla.redhat.com/show_bug.cgi?id=2071543
https://bugzilla.redhat.com/show_bug.cgi?id=2071943
https://bugzilla.redhat.com/show_bug.cgi?id=2079548
https://bugzilla.redhat.com/show_bug.cgi?id=2087120
https://bugzilla.redhat.com/show_bug.cgi?id=2094336
https://bugzilla.redhat.com/show_bug.cgi?id=2116725
https://bugzilla.redhat.com/show_bug.cgi?id=2116729
https://bugzilla.redhat.com/show_bug.cgi?id=2116802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30699
https://errata.almalinux.org/9/ALSA-2022-8062.html
https://errata.rockylinux.org/RLSA-2022:8062
https://linux.oracle.com/cve/CVE-2022-30698.html
https://linux.oracle.com/errata/ELSA-2022-8062.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L3ZFWZZFPBIL654BG75RWXUMPFQJ5EC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D35CX4SCZVNKZTWJXPDFTHWZHINMGEZD/
https://nvd.nist.gov/vuln/detail/CVE-2022-30698
https://security.gentoo.org/glsa/202212-02
https://ubuntu.com/security/notices/USN-5569-1
https://www.cve.org/CVERecord?id=CVE-2022-30698
https://www.nlnetlabs.nl/downloads/unbound/CVE-2022-30698_CVE-2022-30699.txt
|
| unbound-libs |
CVE-2022-30699 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/errata/RHSA-2022:8062
https://access.redhat.com/security/cve/CVE-2022-30699
https://bugzilla.redhat.com/2116725
https://bugzilla.redhat.com/2116729
https://bugzilla.redhat.com/show_bug.cgi?id=1981415
https://bugzilla.redhat.com/show_bug.cgi?id=2056116
https://bugzilla.redhat.com/show_bug.cgi?id=2071543
https://bugzilla.redhat.com/show_bug.cgi?id=2071943
https://bugzilla.redhat.com/show_bug.cgi?id=2079548
https://bugzilla.redhat.com/show_bug.cgi?id=2087120
https://bugzilla.redhat.com/show_bug.cgi?id=2094336
https://bugzilla.redhat.com/show_bug.cgi?id=2116725
https://bugzilla.redhat.com/show_bug.cgi?id=2116729
https://bugzilla.redhat.com/show_bug.cgi?id=2116802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30699
https://errata.almalinux.org/9/ALSA-2022-8062.html
https://errata.rockylinux.org/RLSA-2022:8062
https://linux.oracle.com/cve/CVE-2022-30699.html
https://linux.oracle.com/errata/ELSA-2022-8062.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5L3ZFWZZFPBIL654BG75RWXUMPFQJ5EC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D35CX4SCZVNKZTWJXPDFTHWZHINMGEZD/
https://nvd.nist.gov/vuln/detail/CVE-2022-30699
https://security.gentoo.org/glsa/202212-02
https://ubuntu.com/security/notices/USN-5569-1
https://www.cve.org/CVERecord?id=CVE-2022-30699
https://www.nlnetlabs.nl/downloads/unbound/CVE-2022-30698_CVE-2022-30699.txt
|
| unbound-libs |
CVE-2022-3204 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/errata/RHSA-2023:2370
https://access.redhat.com/security/cve/CVE-2022-3204
https://bugzilla.redhat.com/2128947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3204
https://errata.almalinux.org/9/ALSA-2023-2370.html
https://linux.oracle.com/cve/CVE-2022-3204.html
https://linux.oracle.com/errata/ELSA-2023-2771.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00024.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/35QGS5FBQTG3DBSK7QV67PA64P24ABHY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3G2HS6CYPSIGAKO6QLEZPG3RD6AMPB7B/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4S4EU6DMJXQFMAIE6SLAH4H5RNRU6VQL/
https://nlnetlabs.nl/downloads/unbound/CVE-2022-3204.txt
https://nvd.nist.gov/vuln/detail/CVE-2022-3204
https://security.gentoo.org/glsa/202212-02
https://ubuntu.com/security/notices/USN-5732-1
https://www.cve.org/CVERecord?id=CVE-2022-3204
https://www.nlnetlabs.nl/downloads/unbound/CVE-2022-3204.txt
|
| unbound-libs |
CVE-2024-1931 |
MEDIUM |
1.6.6-5.el7_8 |
|
https://access.redhat.com/security/cve/CVE-2024-1931
https://nvd.nist.gov/vuln/detail/CVE-2024-1931
https://www.cve.org/CVERecord?id=CVE-2024-1931
https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt
|
| unbound-libs |
CVE-2020-28935 |
LOW |
1.6.6-5.el7_8 |
|
https://access.redhat.com/security/cve/CVE-2020-28935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28935
https://linux.oracle.com/cve/CVE-2020-28935.html
https://linux.oracle.com/errata/ELSA-2021-1853.html
https://lists.debian.org/debian-lts-announce/2021/02/msg00017.html
https://lists.debian.org/debian-lts-announce/2023/03/msg00024.html
https://nvd.nist.gov/vuln/detail/CVE-2020-28935
https://security.gentoo.org/glsa/202101-38
https://ubuntu.com/security/notices/USN-4938-1
https://www.cve.org/CVERecord?id=CVE-2020-28935
https://www.nlnetlabs.nl/downloads/nsd/CVE-2020-28935.txt
https://www.nlnetlabs.nl/downloads/unbound/CVE-2020-28935.txt
|
| unzip |
CVE-2015-7696 |
MEDIUM |
6.0-24.el7_9 |
|
http://www.debian.org/security/2015/dsa-3386
http://www.openwall.com/lists/oss-security/2015/09/07/4
http://www.openwall.com/lists/oss-security/2015/09/15/6
http://www.openwall.com/lists/oss-security/2015/09/21/6
http://www.openwall.com/lists/oss-security/2015/10/11/5
http://www.securityfocus.com/bid/76863
http://www.securitytracker.com/id/1034027
http://www.ubuntu.com/usn/USN-2788-1
http://www.ubuntu.com/usn/USN-2788-2
https://access.redhat.com/security/cve/CVE-2015-7696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7696
https://nvd.nist.gov/vuln/detail/CVE-2015-7696
https://ubuntu.com/security/notices/USN-2788-1
https://www.cve.org/CVERecord?id=CVE-2015-7696
|
| unzip |
CVE-2015-7697 |
MEDIUM |
6.0-24.el7_9 |
|
http://sourceforge.net/p/infozip/patches/23/
http://www.debian.org/security/2015/dsa-3386
http://www.openwall.com/lists/oss-security/2015/09/07/4
http://www.openwall.com/lists/oss-security/2015/09/15/6
http://www.openwall.com/lists/oss-security/2015/10/11/5
http://www.securityfocus.com/bid/76863
http://www.securitytracker.com/id/1034027
http://www.ubuntu.com/usn/USN-2788-1
http://www.ubuntu.com/usn/USN-2788-2
https://access.redhat.com/security/cve/CVE-2015-7697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7697
https://nvd.nist.gov/vuln/detail/CVE-2015-7697
https://ubuntu.com/security/notices/USN-2788-1
https://www.cve.org/CVERecord?id=CVE-2015-7697
|
| unzip |
CVE-2014-9913 |
LOW |
6.0-24.el7_9 |
|
http://openwall.com/lists/oss-security/2016/12/05/20
http://www.openwall.com/lists/oss-security/2014/11/03/5
http://www.openwall.com/lists/oss-security/2016/12/05/13
http://www.openwall.com/lists/oss-security/2016/12/05/19
http://www.openwall.com/lists/oss-security/2016/12/05/20
http://www.securityfocus.com/bid/95081
https://access.redhat.com/security/cve/CVE-2014-9913
https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9913
https://nvd.nist.gov/vuln/detail/CVE-2014-9913
https://ubuntu.com/security/notices/USN-4672-1
https://www.cve.org/CVERecord?id=CVE-2014-9913
|
| unzip |
CVE-2016-9844 |
LOW |
6.0-24.el7_9 |
|
http://openwall.com/lists/oss-security/2016/12/05/20
http://openwall.com/lists/oss-security/2016/12/05/25
http://www.openwall.com/lists/oss-security/2016/12/05/13
http://www.openwall.com/lists/oss-security/2016/12/05/19
http://www.openwall.com/lists/oss-security/2016/12/05/20
http://www.securityfocus.com/bid/94728
https://access.redhat.com/security/cve/CVE-2016-9844
https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9844
https://nvd.nist.gov/vuln/detail/CVE-2016-9844
https://ubuntu.com/security/notices/USN-4672-1
https://www.cve.org/CVERecord?id=CVE-2016-9844
|
| unzip |
CVE-2018-1000035 |
LOW |
6.0-24.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2018-1000035
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000035
https://lists.debian.org/debian-lts-announce/2020/01/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2018-1000035
https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
https://security.gentoo.org/glsa/202003-58
https://ubuntu.com/security/notices/USN-4672-1
https://www.cve.org/CVERecord?id=CVE-2018-1000035
https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
|
| unzip |
CVE-2021-4217 |
LOW |
6.0-24.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-4217
https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1957077
https://bugzilla.redhat.com/show_bug.cgi?id=2044583
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217
https://nvd.nist.gov/vuln/detail/CVE-2021-4217
https://ubuntu.com/security/notices/USN-5673-1
https://www.cve.org/CVERecord?id=CVE-2021-4217
|
| unzip |
CVE-2022-0529 |
LOW |
6.0-24.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-0529
https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529
https://github.com/ByteHackr/unzip_poc
https://lists.debian.org/debian-lts-announce/2022/09/msg00028.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0529
https://security.gentoo.org/glsa/202310-17
https://ubuntu.com/security/notices/USN-5673-1
https://www.cve.org/CVERecord?id=CVE-2022-0529
https://www.debian.org/security/2022/dsa-5202
|
| unzip |
CVE-2022-0530 |
LOW |
6.0-24.el7_9 |
|
http://seclists.org/fulldisclosure/2022/May/33
http://seclists.org/fulldisclosure/2022/May/35
http://seclists.org/fulldisclosure/2022/May/38
https://access.redhat.com/security/cve/CVE-2022-0530
https://bugzilla.redhat.com/show_bug.cgi?id=2051395
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530
https://github.com/ByteHackr/unzip_poc
https://lists.debian.org/debian-lts-announce/2022/09/msg00028.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0530
https://security.gentoo.org/glsa/202310-17
https://support.apple.com/kb/HT213255
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213257
https://ubuntu.com/security/notices/USN-5673-1
https://www.cve.org/CVERecord?id=CVE-2022-0530
https://www.debian.org/security/2022/dsa-5202
|
| util-linux |
CVE-2014-9114 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html
http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html
http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html
http://www.openwall.com/lists/oss-security/2014/11/26/13
http://www.openwall.com/lists/oss-security/2014/11/26/21
http://www.securityfocus.com/bid/71327
https://access.redhat.com/security/cve/CVE-2014-9114
https://bugzilla.redhat.com/show_bug.cgi?id=1168485
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114
https://exchange.xforce.ibmcloud.com/vulnerabilities/98993
https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2014-9114
https://security.gentoo.org/glsa/201612-14
https://www.cve.org/CVERecord?id=CVE-2014-9114
|
| util-linux |
CVE-2016-2779 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
http://www.openwall.com/lists/oss-security/2016/02/27/1
http://www.openwall.com/lists/oss-security/2016/02/27/2
https://access.redhat.com/security/cve/CVE-2016-2779
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
https://nvd.nist.gov/vuln/detail/CVE-2016-2779
https://www.cve.org/CVERecord?id=CVE-2016-2779
|
| util-linux |
CVE-2020-21583 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-21583
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21583
https://nvd.nist.gov/vuln/detail/CVE-2020-21583
https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html
https://www.cve.org/CVERecord?id=CVE-2020-21583
|
| util-linux |
CVE-2022-0563 |
MEDIUM |
2.23.2-65.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2022-0563
https://blog.trailofbits.com/2023/02/16/suid-logic-bug-linux-readline/
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u
https://nvd.nist.gov/vuln/detail/CVE-2022-0563
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20220331-0002/
https://www.cve.org/CVERecord?id=CVE-2022-0563
|
| util-linux |
CVE-2015-5218 |
LOW |
2.23.2-65.el7_9.1 |
|
http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html
http://www.spinics.net/lists/util-linux-ng/msg11873.html
https://access.redhat.com/security/cve/CVE-2015-5218
https://bugzilla.redhat.com/show_bug.cgi?id=1259322
https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
https://nvd.nist.gov/vuln/detail/CVE-2015-5218
https://www.cve.org/CVERecord?id=CVE-2015-5218
https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
|
| util-linux |
CVE-2021-37600 |
LOW |
2.23.2-65.el7_9.1 |
|
https://access.redhat.com/security/cve/CVE-2021-37600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600
https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
https://github.com/karelzak/util-linux/issues/1395
https://nvd.nist.gov/vuln/detail/CVE-2021-37600
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20210902-0002/
https://www.cve.org/CVERecord?id=CVE-2021-37600
|
| vim-minimal |
CVE-2019-20807 |
MEDIUM |
2:7.4.629-8.el7_9 |
|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html
http://seclists.org/fulldisclosure/2020/Jul/24
https://access.redhat.com/security/cve/CVE-2019-20807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20807
https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075
https://github.com/vim/vim/releases/tag/v8.1.0881
https://linux.oracle.com/cve/CVE-2019-20807.html
https://linux.oracle.com/errata/ELSA-2020-4453.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2019-20807
https://support.apple.com/kb/HT211289
https://ubuntu.com/security/notices/USN-4582-1
https://ubuntu.com/security/notices/USN-5147-1
https://usn.ubuntu.com/4582-1/
https://www.cve.org/CVERecord?id=CVE-2019-20807
https://www.starwindsoftware.com/security/sw-20220812-0003/
|
| vim-minimal |
CVE-2021-3778 |
MEDIUM |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2021/10/01/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json
https://access.redhat.com/security/cve/CVE-2021-3778
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778
https://errata.almalinux.org/8/ALSA-2021-4517.html
https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
https://linux.oracle.com/cve/CVE-2021-3778.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://nvd.nist.gov/vuln/detail/CVE-2021-3778
https://security.gentoo.org/glsa/202208-32
https://security.netapp.com/advisory/ntap-20221118-0003/
https://ubuntu.com/security/notices/USN-5093-1
https://www.cve.org/CVERecord?id=CVE-2021-3778
|
| vim-minimal |
CVE-2021-3796 |
MEDIUM |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2021/10/01/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json
https://access.redhat.com/security/cve/CVE-2021-3796
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796
https://errata.almalinux.org/8/ALSA-2021-4517.html
https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
https://linux.oracle.com/cve/CVE-2021-3796.html
https://linux.oracle.com/errata/ELSA-2021-4517.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/
https://nvd.nist.gov/vuln/detail/CVE-2021-3796
https://security.gentoo.org/glsa/202208-32
https://security.netapp.com/advisory/ntap-20221118-0004/
https://ubuntu.com/security/notices/USN-5093-1
https://www.cve.org/CVERecord?id=CVE-2021-3796
|
| vim-minimal |
CVE-2021-3872 |
MEDIUM |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-3872
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872
https://errata.almalinux.org/8/ALSA-2022-0366.html
https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
https://linux.oracle.com/cve/CVE-2021-3872.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/
https://nvd.nist.gov/vuln/detail/CVE-2021-3872
https://security.gentoo.org/glsa/202208-32
https://ubuntu.com/security/notices/USN-5147-1
https://www.cve.org/CVERecord?id=CVE-2021-3872
|
| vim-minimal |
CVE-2021-3984 |
MEDIUM |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json
https://access.redhat.com/security/cve/CVE-2021-3984
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984
https://errata.almalinux.org/8/ALSA-2022-0366.html
https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
https://linux.oracle.com/cve/CVE-2021-3984.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://nvd.nist.gov/vuln/detail/CVE-2021-3984
https://security.gentoo.org/glsa/202208-32
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
https://www.cve.org/CVERecord?id=CVE-2021-3984
|
| vim-minimal |
CVE-2021-4019 |
MEDIUM |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json
https://access.redhat.com/security/cve/CVE-2021-4019
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019
https://errata.almalinux.org/8/ALSA-2022-0366.html
https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
https://linux.oracle.com/cve/CVE-2021-4019.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://nvd.nist.gov/vuln/detail/CVE-2021-4019
https://security.gentoo.org/glsa/202208-32
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
https://www.cve.org/CVERecord?id=CVE-2021-4019
|
| vim-minimal |
CVE-2021-4192 |
MEDIUM |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2022/Jul/14
http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4192
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192
https://errata.almalinux.org/8/ALSA-2022-0366.html
https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/
https://linux.oracle.com/cve/CVE-2021-4192.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4192
https://security.gentoo.org/glsa/202208-32
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213343
https://ubuntu.com/security/notices/USN-5433-1
https://ubuntu.com/security/notices/USN-6026-1
https://www.cve.org/CVERecord?id=CVE-2021-4192
|
| vim-minimal |
CVE-2021-4193 |
MEDIUM |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2022/Jul/14
http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4193
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193
https://errata.almalinux.org/8/ALSA-2022-0366.html
https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/
https://linux.oracle.com/cve/CVE-2021-4193.html
https://linux.oracle.com/errata/ELSA-2022-0366.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4193
https://security.gentoo.org/glsa/202208-32
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213343
https://ubuntu.com/security/notices/USN-5458-1
https://ubuntu.com/security/notices/USN-6026-1
https://www.cve.org/CVERecord?id=CVE-2021-4193
|
| vim-minimal |
CVE-2022-0359 |
MEDIUM |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
http://seclists.org/fulldisclosure/2022/Oct/43
https://access.redhat.com/security/cve/CVE-2022-0359
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359
https://errata.almalinux.org/8/ALSA-2022-0894.html
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214)
https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
https://linux.oracle.com/cve/CVE-2022-0359.html
https://linux.oracle.com/errata/ELSA-2022-0894.html
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0359
https://security.gentoo.org/glsa/202208-32
https://support.apple.com/kb/HT213444
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5458-1
https://ubuntu.com/security/notices/USN-6026-1
https://www.cve.org/CVERecord?id=CVE-2022-0359
|
| vim-minimal |
CVE-2022-1621 |
MEDIUM |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
https://access.redhat.com/errata/RHSA-2022:5242
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1621.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1629.json
https://access.redhat.com/security/cve/CVE-2022-1621
https://bugzilla.redhat.com/2058483
https://bugzilla.redhat.com/2064064
https://bugzilla.redhat.com/2073013
https://bugzilla.redhat.com/2077734
https://bugzilla.redhat.com/2083924
https://bugzilla.redhat.com/2083931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621
https://errata.almalinux.org/9/ALSA-2022-5242.html
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919)
https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
https://linux.oracle.com/cve/CVE-2022-1621.html
https://linux.oracle.com/errata/ELSA-2022-5319.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://nvd.nist.gov/vuln/detail/CVE-2022-1621
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5460-1
https://ubuntu.com/security/notices/USN-5613-1
https://www.cve.org/CVERecord?id=CVE-2022-1621
|
| vim-minimal |
CVE-2022-1629 |
MEDIUM |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
https://access.redhat.com/errata/RHSA-2022:5242
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1621.json
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1629.json
https://access.redhat.com/security/cve/CVE-2022-1629
https://bugzilla.redhat.com/2058483
https://bugzilla.redhat.com/2064064
https://bugzilla.redhat.com/2073013
https://bugzilla.redhat.com/2077734
https://bugzilla.redhat.com/2083924
https://bugzilla.redhat.com/2083931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629
https://errata.almalinux.org/9/ALSA-2022-5242.html
https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd
https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee
https://linux.oracle.com/cve/CVE-2022-1629.html
https://linux.oracle.com/errata/ELSA-2022-5319.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://nvd.nist.gov/vuln/detail/CVE-2022-1629
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5498-1
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-1629
|
| vim-minimal |
CVE-2017-1000382 |
LOW |
2:7.4.629-8.el7_9 |
|
http://security.cucumberlinux.com/security/details.php?id=120
http://www.openwall.com/lists/oss-security/2017/10/31/1
https://access.redhat.com/security/cve/CVE-2017-1000382
https://nvd.nist.gov/vuln/detail/CVE-2017-1000382
https://www.cve.org/CVERecord?id=CVE-2017-1000382
|
| vim-minimal |
CVE-2017-11109 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2017-11109
https://bugzilla.redhat.com/show_bug.cgi?id=1468492
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11109
https://lists.debian.org/debian-lts-announce/2019/08/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2017-11109
https://ubuntu.com/security/notices/USN-4309-1
https://usn.ubuntu.com/4309-1/
https://www.cve.org/CVERecord?id=CVE-2017-11109
https://www.mail-archive.com/vim_dev@googlegroups.com/msg45274.html
|
| vim-minimal |
CVE-2017-17087 |
LOW |
2:7.4.629-8.el7_9 |
|
http://openwall.com/lists/oss-security/2017/11/27/2
http://security.cucumberlinux.com/security/details.php?id=166
https://access.redhat.com/security/cve/CVE-2017-17087
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17087
https://github.com/vim/vim/commit/5a73e0ca54c77e067c3b12ea6f35e3e8681e8cf8
https://groups.google.com/d/msg/vim_dev/sRT9BtjLWMk/BRtSXNU4BwAJ
https://lists.debian.org/debian-lts-announce/2019/08/msg00003.html
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
https://nvd.nist.gov/vuln/detail/CVE-2017-17087
https://ubuntu.com/security/notices/USN-4582-1
https://ubuntu.com/security/notices/USN-5147-1
https://usn.ubuntu.com/4582-1/
https://www.cve.org/CVERecord?id=CVE-2017-17087
|
| vim-minimal |
CVE-2017-5953 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.debian.org/security/2017/dsa-3786
http://www.securityfocus.com/bid/96217
https://access.redhat.com/security/cve/CVE-2017-5953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5953
https://github.com/vim/vim/commit/399c297aa93afe2c0a39e2a1b3f972aebba44c9d
https://groups.google.com/forum/#!topic/vim_dev/t-3RSdEnrHY
https://groups.google.com/forum/#%21topic/vim_dev/t-3RSdEnrHY
https://nvd.nist.gov/vuln/detail/CVE-2017-5953
https://security.gentoo.org/glsa/201706-26
https://ubuntu.com/security/notices/USN-4016-1
https://ubuntu.com/security/notices/USN-4309-1
https://usn.ubuntu.com/4016-1/
https://usn.ubuntu.com/4309-1/
https://www.cve.org/CVERecord?id=CVE-2017-5953
|
| vim-minimal |
CVE-2017-6350 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.securityfocus.com/bid/96448
http://www.securitytracker.com/id/1037949
https://access.redhat.com/security/cve/CVE-2017-6350
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6350
https://github.com/vim/vim/commit/0c8485f0e4931463c0f7986e1ea84a7d79f10c75
https://groups.google.com/forum/#!topic/vim_dev/L_dOHOOiQ5Q
https://groups.google.com/forum/#!topic/vim_dev/QPZc0CY9j3Y
https://groups.google.com/forum/#%21topic/vim_dev/L_dOHOOiQ5Q
https://groups.google.com/forum/#%21topic/vim_dev/QPZc0CY9j3Y
https://nvd.nist.gov/vuln/detail/CVE-2017-6350
https://security.gentoo.org/glsa/201706-26
https://ubuntu.com/security/notices/USN-4309-1
https://usn.ubuntu.com/4309-1/
https://www.cve.org/CVERecord?id=CVE-2017-6350
|
| vim-minimal |
CVE-2021-3236 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2021-3236
https://github.com/vim/vim/issues/7674
https://nvd.nist.gov/vuln/detail/CVE-2021-3236
https://security.netapp.com/advisory/ntap-20230915-0001/
https://www.cve.org/CVERecord?id=CVE-2021-3236
|
| vim-minimal |
CVE-2021-3903 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903
https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://nvd.nist.gov/vuln/detail/CVE-2021-3903
https://ubuntu.com/security/notices/USN-5147-1
https://www.cve.org/CVERecord?id=CVE-2021-3903
|
| vim-minimal |
CVE-2021-3927 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927
https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://nvd.nist.gov/vuln/detail/CVE-2021-3927
https://security.gentoo.org/glsa/202208-32
https://ubuntu.com/security/notices/USN-5147-1
https://www.cve.org/CVERecord?id=CVE-2021-3927
|
| vim-minimal |
CVE-2021-3974 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-3974
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974
https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/
https://nvd.nist.gov/vuln/detail/CVE-2021-3974
https://security.gentoo.org/glsa/202208-32
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
https://www.cve.org/CVERecord?id=CVE-2021-3974
|
| vim-minimal |
CVE-2021-4069 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4069
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069
https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/
https://nvd.nist.gov/vuln/detail/CVE-2021-4069
https://security.gentoo.org/glsa/202208-32
https://ubuntu.com/security/notices/USN-5247-1
https://ubuntu.com/security/notices/USN-5433-1
https://www.cve.org/CVERecord?id=CVE-2021-4069
|
| vim-minimal |
CVE-2021-4166 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2022/Jul/14
http://seclists.org/fulldisclosure/2022/Mar/29
http://seclists.org/fulldisclosure/2022/May/35
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://access.redhat.com/security/cve/CVE-2021-4166
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166
https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/
https://nvd.nist.gov/vuln/detail/CVE-2021-4166
https://security.gentoo.org/glsa/202208-32
https://support.apple.com/kb/HT213183
https://support.apple.com/kb/HT213256
https://support.apple.com/kb/HT213343
https://ubuntu.com/security/notices/USN-6026-1
https://www.cve.org/CVERecord?id=CVE-2021-4166
|
| vim-minimal |
CVE-2022-0351 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
http://seclists.org/fulldisclosure/2022/Oct/43
https://access.redhat.com/security/cve/CVE-2022-0351
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d
https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206)
https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2022-0351
https://security.gentoo.org/glsa/202208-32
https://support.apple.com/kb/HT213444
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5458-1
https://ubuntu.com/security/notices/USN-6026-1
https://www.cve.org/CVERecord?id=CVE-2022-0351
|
| vim-minimal |
CVE-2022-1154 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/errata/RHSA-2022:5242
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1154.json
https://access.redhat.com/security/cve/CVE-2022-1154
https://bugzilla.redhat.com/2058483
https://bugzilla.redhat.com/2064064
https://bugzilla.redhat.com/2073013
https://bugzilla.redhat.com/2077734
https://bugzilla.redhat.com/2083924
https://bugzilla.redhat.com/2083931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154
https://errata.almalinux.org/9/ALSA-2022-5242.html
https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
https://linux.oracle.com/cve/CVE-2022-1154.html
https://linux.oracle.com/errata/ELSA-2022-5242.html
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/
https://nvd.nist.gov/vuln/detail/CVE-2022-1154
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5433-1
https://ubuntu.com/security/notices/USN-5613-1
https://www.cve.org/CVERecord?id=CVE-2022-1154
https://www.oracle.com/security-alerts/cpujul2022.html
|
| vim-minimal |
CVE-2022-1619 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
https://access.redhat.com/security/cve/CVE-2022-1619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619
https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450/
https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/
https://nvd.nist.gov/vuln/detail/CVE-2022-1619
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://security.netapp.com/advisory/ntap-20220930-0007/
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5460-1
https://ubuntu.com/security/notices/USN-5613-1
https://www.cve.org/CVERecord?id=CVE-2022-1619
|
| vim-minimal |
CVE-2022-1720 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
http://seclists.org/fulldisclosure/2022/Oct/43
http://seclists.org/fulldisclosure/2022/Oct/45
https://access.redhat.com/security/cve/CVE-2022-1720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1720
https://github.com/vim/vim/commit/395bd1f6d3edc9f7edb5d1f2d7deaf5a9e3ab93c
https://github.com/vim/vim/commit/395bd1f6d3edc9f7edb5d1f2d7deaf5a9e3ab93c (v8.2.4956)
https://huntr.dev/bounties/5ccfb386-7eb9-46e5-98e5-243ea4b358a8
https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://nvd.nist.gov/vuln/detail/CVE-2022-1720
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://support.apple.com/kb/HT213443
https://support.apple.com/kb/HT213444
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-1720
|
| vim-minimal |
CVE-2022-2124 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
http://seclists.org/fulldisclosure/2022/Oct/43
http://seclists.org/fulldisclosure/2022/Oct/45
https://access.redhat.com/security/cve/CVE-2022-2124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2124
https://github.com/vim/vim/commit/2f074f4685897ab7212e25931eeeb0212292829f
https://huntr.dev/bounties/8e9e056d-f733-4540-98b6-414bf36e0b42
https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://nvd.nist.gov/vuln/detail/CVE-2022-2124
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://support.apple.com/kb/HT213443
https://support.apple.com/kb/HT213444
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5723-1
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2124
|
| vim-minimal |
CVE-2022-2125 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
http://seclists.org/fulldisclosure/2022/Oct/43
http://seclists.org/fulldisclosure/2022/Oct/45
https://access.redhat.com/security/cve/CVE-2022-2125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2125
https://github.com/vim/vim/commit/0e8e938d497260dd57be67b4966cb27a5f72376f
https://huntr.dev/bounties/17dab24d-beec-464d-9a72-5b6b11283705
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://nvd.nist.gov/vuln/detail/CVE-2022-2125
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://support.apple.com/kb/HT213443
https://support.apple.com/kb/HT213444
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5723-1
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2125
|
| vim-minimal |
CVE-2022-2126 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
http://seclists.org/fulldisclosure/2022/Oct/43
http://seclists.org/fulldisclosure/2022/Oct/45
https://access.redhat.com/security/cve/CVE-2022-2126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2126
https://github.com/vim/vim/commit/156d3911952d73b03d7420dc3540215247db0fe8
https://huntr.dev/bounties/8d196d9b-3d10-41d2-9f70-8ef0d08c946e
https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://nvd.nist.gov/vuln/detail/CVE-2022-2126
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://support.apple.com/kb/HT213443
https://support.apple.com/kb/HT213444
https://support.apple.com/kb/HT213488
https://ubuntu.com/security/notices/USN-5723-1
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2126
|
| vim-minimal |
CVE-2022-2129 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2129
https://github.com/vim/vim/commit/d6211a52ab9f53b82f884561ed43d2fe4d24ff7d
https://github.com/vim/vim/commit/d6211a52ab9f53b82f884561ed43d2fe4d24ff7d (v8.2.5126)
https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352
https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://nvd.nist.gov/vuln/detail/CVE-2022-2129
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5533-1
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2129
|
| vim-minimal |
CVE-2022-2175 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2175
https://github.com/vim/vim/commit/6046aded8da002b08d380db29de2ba0268b6616e
https://github.com/vim/vim/issues/10607
https://huntr.dev/bounties/7f0481c2-8b57-4324-b47c-795d1ea67e55
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://nvd.nist.gov/vuln/detail/CVE-2022-2175
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5723-1
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2175
|
| vim-minimal |
CVE-2022-2182 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2182
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2182
https://github.com/vim/vim/commit/f7c7c3fad6d2135d558f3b36d0d1a943118aeb5e
https://huntr.dev/bounties/238d8650-3beb-4831-a8f7-6f0b597a6fb8
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://nvd.nist.gov/vuln/detail/CVE-2022-2182
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6270-1
https://www.cve.org/CVERecord?id=CVE-2022-2182
|
| vim-minimal |
CVE-2022-2183 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2183
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2183
https://github.com/vim/vim/commit/8eba2bd291b347e3008aa9e565652d51ad638cfa
https://huntr.dev/bounties/d74ca3f9-380d-4c0a-b61c-11113cc98975
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://nvd.nist.gov/vuln/detail/CVE-2022-2183
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5723-1
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2183
|
| vim-minimal |
CVE-2022-2206 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2206
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2206
https://github.com/vim/vim/commit/e178af5a586ea023622d460779fdcabbbfac0908
https://huntr.dev/bounties/01d01e74-55d0-4d9e-878e-79ba599be668
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://nvd.nist.gov/vuln/detail/CVE-2022-2206
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5723-1
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2206
|
| vim-minimal |
CVE-2022-2207 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2207
https://github.com/vim/vim/commit/0971c7a4e537ea120a6bb2195960be8d0815e97b
https://github.com/vim/vim/commit/0971c7a4e537ea120a6bb2195960be8d0815e97b (v8.2.5162)
https://huntr.dev/bounties/05bc6051-4dc3-483b-ae56-cf23346b97b9
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://nvd.nist.gov/vuln/detail/CVE-2022-2207
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5516-1
https://ubuntu.com/security/notices/USN-6026-1
https://www.cve.org/CVERecord?id=CVE-2022-2207
|
| vim-minimal |
CVE-2022-2208 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2208
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2208
https://github.com/vim/vim/commit/cd38bb4d83c942c4bad596835c6766cbf32e5195
https://huntr.dev/bounties/7bfe3d5b-568f-4c34-908f-a39909638cc1
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://nvd.nist.gov/vuln/detail/CVE-2022-2208
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6270-1
https://www.cve.org/CVERecord?id=CVE-2022-2208
|
| vim-minimal |
CVE-2022-2210 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2210
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2210
https://github.com/vim/vim/commit/c101abff4c6756db4f5e740fde289decb9452efa
https://github.com/vim/vim/commit/c101abff4c6756db4f5e740fde289decb9452efa (v8.2.5164)
https://huntr.dev/bounties/020845f8-f047-4072-af0f-3726fe1aea25
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://nvd.nist.gov/vuln/detail/CVE-2022-2210
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5516-1
https://ubuntu.com/security/notices/USN-6270-1
https://www.cve.org/CVERecord?id=CVE-2022-2210
|
| vim-minimal |
CVE-2022-2231 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2231
https://github.com/vim/vim/commit/79481367a457951aabd9501b510fd7e3eb29c3d8
https://github.com/vim/vim/commit/79481367a457951aabd9501b510fd7e3eb29c3d8 (v8.2.5169)
https://huntr.dev/bounties/8dae6ab4-7a7a-4716-a65c-9b090fa057b5
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U743FMJGFQ35GBPCQ6OWMVZEJPDFVEWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
https://nvd.nist.gov/vuln/detail/CVE-2022-2231
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6270-1
https://www.cve.org/CVERecord?id=CVE-2022-2231
|
| vim-minimal |
CVE-2022-2284 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2284
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2284
https://github.com/vim/vim/commit/3d51ce18ab1be4f9f6061568a4e7fabf00b21794
https://github.com/vim/vim/commit/3d51ce18ab1be4f9f6061568a4e7fabf00b21794 (v9.0.0017)
https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874
https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
https://nvd.nist.gov/vuln/detail/CVE-2022-2284
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6270-1
https://www.cve.org/CVERecord?id=CVE-2022-2284
|
| vim-minimal |
CVE-2022-2285 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2285
https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe
https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe (v9.0.0018)
https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736
https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736/
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
https://nvd.nist.gov/vuln/detail/CVE-2022-2285
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6270-1
https://www.cve.org/CVERecord?id=CVE-2022-2285
|
| vim-minimal |
CVE-2022-2286 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2286
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2286
https://github.com/vim/vim/commit/f12129f1714f7d2301935bb21d896609bdac221c
https://github.com/vim/vim/commit/f12129f1714f7d2301935bb21d896609bdac221c (v9.0.0020)
https://huntr.dev/bounties/fe7681fb-2318-436b-8e65-daf66cd597d8
https://huntr.dev/bounties/fe7681fb-2318-436b-8e65-daf66cd597d8/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
https://nvd.nist.gov/vuln/detail/CVE-2022-2286
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6270-1
https://www.cve.org/CVERecord?id=CVE-2022-2286
|
| vim-minimal |
CVE-2022-2287 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2287
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2287
https://github.com/vim/vim/commit/5e59ea54c0c37c2f84770f068d95280069828774
https://github.com/vim/vim/commit/5e59ea54c0c37c2f84770f068d95280069828774 (v9.0.0021)
https://huntr.dev/bounties/654aa069-3a9d-45d3-9a52-c1cf3490c284
https://huntr.dev/bounties/654aa069-3a9d-45d3-9a52-c1cf3490c284/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
https://nvd.nist.gov/vuln/detail/CVE-2022-2287
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6270-1
https://www.cve.org/CVERecord?id=CVE-2022-2287
|
| vim-minimal |
CVE-2022-2288 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2288
https://github.com/vim/vim/commit/c6fdb15d423df22e1776844811d082322475e48a
https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
https://nvd.nist.gov/vuln/detail/CVE-2022-2288
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://www.cve.org/CVERecord?id=CVE-2022-2288
|
| vim-minimal |
CVE-2022-2289 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2289
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2289
https://github.com/vim/vim/commit/c5274dd12224421f2430b30c53b881b9403d649e
https://github.com/vim/vim/commit/c5274dd12224421f2430b30c53b881b9403d649e (v9.0.0026)
https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64
https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
https://nvd.nist.gov/vuln/detail/CVE-2022-2289
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6270-1
https://www.cve.org/CVERecord?id=CVE-2022-2289
|
| vim-minimal |
CVE-2022-2343 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2343
https://github.com/vim/vim/commit/caea66442d86e7bbba3bf3dc202c3c0d549b9853
https://huntr.dev/bounties/2ecb4345-2fc7-4e7f-adb0-83a20bb458f5
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
https://nvd.nist.gov/vuln/detail/CVE-2022-2343
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://www.cve.org/CVERecord?id=CVE-2022-2343
|
| vim-minimal |
CVE-2022-2344 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2344
https://github.com/vim/vim/commit/baefde14550231f6468ac2ed2ed495bc381c0c92
https://github.com/vim/vim/commit/baefde14550231f6468ac2ed2ed495bc381c0c92 (v9.0.0046)
https://huntr.dev/bounties/4a095ed9-3125-464a-b656-c31b437e1996
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
https://nvd.nist.gov/vuln/detail/CVE-2022-2344
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2344
|
| vim-minimal |
CVE-2022-2345 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2345
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2345
https://github.com/vim/vim/commit/32acf1f1a72ebb9d8942b9c9d80023bf1bb668ea
https://huntr.dev/bounties/1eed7009-db6d-487b-bc41-8f2fd260483f
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
https://nvd.nist.gov/vuln/detail/CVE-2022-2345
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5775-1
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2345
|
| vim-minimal |
CVE-2022-2571 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2571
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2571
https://github.com/vim/vim/commit/a6f9e300161f4cb54713da22f65b261595e8e614
https://huntr.dev/bounties/2e5a1dc4-2dfb-4e5f-8c70-e1ede21f3571
https://nvd.nist.gov/vuln/detail/CVE-2022-2571
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2571
|
| vim-minimal |
CVE-2022-2580 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2580
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2580
https://github.com/vim/vim/commit/1e56bda9048a9625bce6e660938c834c5c15b07d
https://huntr.dev/bounties/c5f2f1d4-0441-4881-b19c-055acaa16249
https://nvd.nist.gov/vuln/detail/CVE-2022-2580
https://ubuntu.com/security/notices/USN-6302-1
https://www.cve.org/CVERecord?id=CVE-2022-2580
|
| vim-minimal |
CVE-2022-2581 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2581
https://github.com/vim/vim/commit/f50940531dd57135fe60aa393ac9d3281f352d88
https://huntr.dev/bounties/0bedbae2-82ae-46ae-aa68-1c28b309b60b
https://nvd.nist.gov/vuln/detail/CVE-2022-2581
https://ubuntu.com/security/notices/USN-5775-1
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2581
|
| vim-minimal |
CVE-2022-2598 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2598
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2598
https://github.com/vim/vim/commit/4e677b9c40ccbc5f090971b31dc2fe07bf05541d
https://huntr.dev/bounties/2f08363a-47a2-422d-a7de-ce96a89ad08e
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://nvd.nist.gov/vuln/detail/CVE-2022-2598
https://ubuntu.com/security/notices/USN-6302-1
https://www.cve.org/CVERecord?id=CVE-2022-2598
|
| vim-minimal |
CVE-2022-2816 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2816
https://github.com/vim/vim/commit/dbdd16b62560413abcc3c8e893cc3010ccf31666
https://github.com/vim/vim/commit/dbdd16b62560413abcc3c8e893cc3010ccf31666 (v9.0.0212)
https://huntr.dev/bounties/e2a83037-fcf9-4218-b2b9-b7507dacde58
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHFAR6OY6G77M6GXCJT75A4KITLNR6GO/
https://nvd.nist.gov/vuln/detail/CVE-2022-2816
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6302-1
https://www.cve.org/CVERecord?id=CVE-2022-2816
|
| vim-minimal |
CVE-2022-2817 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2817
https://github.com/vim/vim/commit/249e1b903a9c0460d618f6dcc59aeb8c03b24b20
https://github.com/vim/vim/commit/249e1b903a9c0460d618f6dcc59aeb8c03b24b20 (v9.0.0213)
https://huntr.dev/bounties/a7b7d242-3d88-4bde-a681-6c986aff886f
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHFAR6OY6G77M6GXCJT75A4KITLNR6GO/
https://nvd.nist.gov/vuln/detail/CVE-2022-2817
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6302-1
https://www.cve.org/CVERecord?id=CVE-2022-2817
|
| vim-minimal |
CVE-2022-2819 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2819
https://github.com/vim/vim/commit/d1d8f6bacb489036d0fd479c9dd3c0102c988889
https://huntr.dev/bounties/0a9bd71e-66b8-4eb1-9566-7dfd9b097e59
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHFAR6OY6G77M6GXCJT75A4KITLNR6GO/
https://nvd.nist.gov/vuln/detail/CVE-2022-2819
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6302-1
https://www.cve.org/CVERecord?id=CVE-2022-2819
|
| vim-minimal |
CVE-2022-2845 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2845
https://github.com/vim/vim/commit/e98c88c44c308edaea5994b8ad4363e65030968c
https://huntr.dev/bounties/3e1d31ac-1cfd-4a9f-bc5c-213376b69445
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
https://nvd.nist.gov/vuln/detail/CVE-2022-2845
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2845
|
| vim-minimal |
CVE-2022-2849 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2849
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2849
https://github.com/vim/vim/commit/f6d39c31d2177549a986d170e192d8351bd571e2
https://huntr.dev/bounties/389aeccd-deb9-49ae-9b6a-24c12d79b02e
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
https://nvd.nist.gov/vuln/detail/CVE-2022-2849
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2849
|
| vim-minimal |
CVE-2022-2862 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2862
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2862
https://github.com/vim/vim/commit/1889f499a4f248cd84e0e0bf6d0d820016774494
https://github.com/vim/vim/commit/1889f499a4f248cd84e0e0bf6d0d820016774494 (v9.0.0221)
https://huntr.dev/bounties/71180988-1ab6-4311-bca8-e9a879b06765
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
https://nvd.nist.gov/vuln/detail/CVE-2022-2862
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6302-1
https://www.cve.org/CVERecord?id=CVE-2022-2862
|
| vim-minimal |
CVE-2022-2874 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2874
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2874
https://github.com/vim/vim/commit/4875d6ab068f09df88d24d81de40dcd8d56e243d
https://huntr.dev/bounties/95f97dfe-247d-475d-9740-b7adc71f4c79
https://nvd.nist.gov/vuln/detail/CVE-2022-2874
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6302-1
https://www.cve.org/CVERecord?id=CVE-2022-2874
|
| vim-minimal |
CVE-2022-2889 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2889
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2889
https://github.com/vim/vim/commit/91c7cbfe31bbef57d5fcf7d76989fc159f73ef15
https://huntr.dev/bounties/d1ac9817-825d-49ce-b514-1d5b12b6bdaa
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
https://nvd.nist.gov/vuln/detail/CVE-2022-2889
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6302-1
https://www.cve.org/CVERecord?id=CVE-2022-2889
|
| vim-minimal |
CVE-2022-2923 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2923
https://github.com/vim/vim/commit/6669de1b235843968e88844ca6d3c8dec4b01a9e
https://github.com/vim/vim/commit/6669de1b235843968e88844ca6d3c8dec4b01a9e (v9.0.0240)
https://huntr.dev/bounties/fd3a3ab8-ab0f-452f-afea-8c613e283fd2
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
https://nvd.nist.gov/vuln/detail/CVE-2022-2923
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2923
|
| vim-minimal |
CVE-2022-2946 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2946
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2946
https://github.com/vim/vim/commit/adce965162dd89bf29ee0e5baf53652e7515762c
https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
https://nvd.nist.gov/vuln/detail/CVE-2022-2946
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2946
|
| vim-minimal |
CVE-2022-2980 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-2980
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2980
https://github.com/vim/vim/commit/80525751c5ce9ed82c41d83faf9ef38667bf61b1
https://huntr.dev/bounties/6e7b12a5-242c-453d-b39e-9625d563b0ea
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
https://nvd.nist.gov/vuln/detail/CVE-2022-2980
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5995-1
https://www.cve.org/CVERecord?id=CVE-2022-2980
|
| vim-minimal |
CVE-2022-3037 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-3037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3037
https://github.com/vim/vim/commit/4f1b083be43f351bc107541e7b0c9655a5d2c0bb
https://huntr.dev/bounties/af4c2f2d-d754-4607-b565-9e92f3f717b5
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RY3GEN2Q46ZJKSNHTN2XB6B3VAJBEILN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHJ6LCLHGGVI2U6ZHXHTZ2PYP4STC23N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
https://nvd.nist.gov/vuln/detail/CVE-2022-3037
https://ubuntu.com/security/notices/USN-6302-1
https://www.cve.org/CVERecord?id=CVE-2022-3037
|
| vim-minimal |
CVE-2022-3153 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-3153
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3153
https://github.com/vim/vim/commit/1540d334a04d874c2aa9d26b82dbbcd4bc5a78de
https://huntr.dev/bounties/68331124-620d-48bc-a8fa-cd947b26270a
https://huntr.dev/bounties/68331124-620d-48bc-a8fa-cd947b26270a/
https://nvd.nist.gov/vuln/detail/CVE-2022-3153
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6302-1
https://www.cve.org/CVERecord?id=CVE-2022-3153
|
| vim-minimal |
CVE-2022-3234 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-3234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3234
https://github.com/vim/vim/commit/c249913edc35c0e666d783bfc21595cf9f7d9e0d
https://huntr.dev/bounties/90fdf374-bf04-4386-8a23-38c83b88f0da
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
https://nvd.nist.gov/vuln/detail/CVE-2022-3234
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6420-1
https://www.cve.org/CVERecord?id=CVE-2022-3234
|
| vim-minimal |
CVE-2022-3235 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-3235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3235
https://github.com/vim/vim/commit/1c3dd8ddcba63c1af5112e567215b3cec2de11d0
https://huntr.dev/bounties/96d5f7a0-a834-4571-b73b-0fe523b941af
https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
https://nvd.nist.gov/vuln/detail/CVE-2022-3235
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6420-1
https://www.cve.org/CVERecord?id=CVE-2022-3235
|
| vim-minimal |
CVE-2022-3256 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-3256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3256
https://github.com/vim/vim/commit/8ecfa2c56b4992c7f067b92488aa9acea5a454ad
https://huntr.dev/bounties/8336a3df-212a-4f8d-ae34-76ef1f936bb3
https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
https://nvd.nist.gov/vuln/detail/CVE-2022-3256
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5775-1
https://ubuntu.com/security/notices/USN-6420-1
https://www.cve.org/CVERecord?id=CVE-2022-3256
|
| vim-minimal |
CVE-2022-3296 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-3296
https://github.com/vim/vim/commit/96b9bf8f74af8abf1e30054f996708db7dc285be
https://huntr.dev/bounties/958866b8-526a-4979-9471-39392e0c9077
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
https://nvd.nist.gov/vuln/detail/CVE-2022-3296
https://security.gentoo.org/glsa/202305-16
https://www.cve.org/CVERecord?id=CVE-2022-3296
|
| vim-minimal |
CVE-2022-3352 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-3352
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3352
https://github.com/vim/vim/commit/ef976323e770315b5fca544efb6b2faa25674d15
https://huntr.dev/bounties/d058f182-a49b-40c7-9234-43d4c5a29f60
https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4QI7AETXBHPC7SGA77Q7O5IEGULWYET7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
https://nvd.nist.gov/vuln/detail/CVE-2022-3352
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6420-1
https://www.cve.org/CVERecord?id=CVE-2022-3352
|
| vim-minimal |
CVE-2022-3520 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-3520
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3520
https://github.com/vim/vim/commit/36343ae0fb7247e060abfd35fb8e4337b33abb4b
https://huntr.dev/bounties/c1db3b70-f4fe-481f-8a24-0b1449c94246
https://nvd.nist.gov/vuln/detail/CVE-2022-3520
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-6420-1
https://www.cve.org/CVERecord?id=CVE-2022-3520
|
| vim-minimal |
CVE-2022-3591 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-3591
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3591
https://github.com/vim/vim/commit/8f3c3c6cd044e3b5bf08dbfa3b3f04bb3f711bad
https://huntr.dev/bounties/a5a998c2-4b07-47a7-91be-dbc1886b3921
https://nvd.nist.gov/vuln/detail/CVE-2022-3591
https://security.gentoo.org/glsa/202305-16
https://ubuntu.com/security/notices/USN-5775-1
https://ubuntu.com/security/notices/USN-6420-1
https://www.cve.org/CVERecord?id=CVE-2022-3591
|
| vim-minimal |
CVE-2022-3705 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2023/Jan/19
https://access.redhat.com/security/cve/CVE-2022-3705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3705
https://github.com/vim/vim/commit/d0fab10ed2a86698937e3c3fed2f10bd9bb5e731
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4JCW33NOLMELTTTDJH7WGDIFJZ5YEEMK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GTBVD4J2SKVSWK4VBN5JP5OEVK6GDS3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYEK5RNMH7MVQH6RPBKLSCCA6NMIKHDV/
https://nvd.nist.gov/vuln/detail/CVE-2022-3705
https://security.gentoo.org/glsa/202305-16
https://security.netapp.com/advisory/ntap-20221223-0004/
https://support.apple.com/kb/HT213605
https://ubuntu.com/security/notices/USN-6420-1
https://vuldb.com/?id.212324
https://www.cve.org/CVERecord?id=CVE-2022-3705
|
| vim-minimal |
CVE-2022-4292 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2022-4292
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4292
https://github.com/vim/vim/commit/c3d27ada14acd02db357f2d16347acc22cb17e93
https://huntr.dev/bounties/da3d4c47-e57a-451e-993d-9df0ed31f57b
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYC22GGZ6QA66HLNLHCTAJU265TT3O33/
https://nvd.nist.gov/vuln/detail/CVE-2022-4292
https://security.gentoo.org/glsa/202305-16
https://security.netapp.com/advisory/ntap-20230113-0005/
https://ubuntu.com/security/notices/USN-6420-1
https://www.cve.org/CVERecord?id=CVE-2022-4292
|
| vim-minimal |
CVE-2023-0049 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2023/Mar/17
https://access.redhat.com/security/cve/CVE-2023-0049
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0049
https://github.com/vim/vim/commit/7b17eb4b063a234376c1ec909ee293e42cff290c
https://github.com/vim/vim/commit/7b17eb4b063a234376c1ec909ee293e42cff290c (v9.0.1143)
https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9
https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3Y752EAVACVC5XY2TMGGOAIU25VQRPDW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T33LLWHLH63XDCO5OME7NWN63RA4U5HF/
https://nvd.nist.gov/vuln/detail/CVE-2023-0049
https://security.gentoo.org/glsa/202305-16
https://support.apple.com/kb/HT213670
https://ubuntu.com/security/notices/USN-5836-1
https://ubuntu.com/security/notices/USN-5963-1
https://www.cve.org/CVERecord?id=CVE-2023-0049
|
| vim-minimal |
CVE-2023-0051 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2023/Mar/17
https://access.redhat.com/security/cve/CVE-2023-0051
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0051
https://github.com/vim/vim/commit/c32949b0779106ed5710ae3bffc5053e49083ab4
https://github.com/vim/vim/commit/c32949b0779106ed5710ae3bffc5053e49083ab4 (v9.0.1144)
https://huntr.dev/bounties/1c8686db-baa6-42dc-ba45-aed322802de9
https://nvd.nist.gov/vuln/detail/CVE-2023-0051
https://security.gentoo.org/glsa/202305-16
https://support.apple.com/kb/HT213670
https://ubuntu.com/security/notices/USN-5963-1
https://www.cve.org/CVERecord?id=CVE-2023-0051
|
| vim-minimal |
CVE-2023-0054 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2023/Mar/17
https://access.redhat.com/security/cve/CVE-2023-0054
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0054
https://github.com/vim/vim/commit/3ac1d97a1d9353490493d30088256360435f7731
https://github.com/vim/vim/commit/3ac1d97a1d9353490493d30088256360435f7731 (v9.0.1145)
https://huntr.dev/bounties/b289ee0f-fd16-4147-bd01-c6289c45e49d
https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html
https://nvd.nist.gov/vuln/detail/CVE-2023-0054
https://security.gentoo.org/glsa/202305-16
https://support.apple.com/kb/HT213670
https://ubuntu.com/security/notices/USN-5836-1
https://ubuntu.com/security/notices/USN-5963-1
https://www.cve.org/CVERecord?id=CVE-2023-0054
|
| vim-minimal |
CVE-2023-0288 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2023/Mar/17
https://access.redhat.com/security/cve/CVE-2023-0288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0288
https://github.com/vim/vim/commit/232bdaaca98c34a99ffadf27bf6ee08be6cc8f6a
https://github.com/vim/vim/commit/232bdaaca98c34a99ffadf27bf6ee08be6cc8f6a (v9.0.1189)
https://huntr.dev/bounties/550a0852-9be0-4abe-906c-f803b34e41d3
https://huntr.dev/bounties/5d389a18-5026-47df-a5d0-1548a9b555d5
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WYC22GGZ6QA66HLNLHCTAJU265TT3O33/
https://nvd.nist.gov/vuln/detail/CVE-2023-0288
https://support.apple.com/kb/HT213670
https://ubuntu.com/security/notices/USN-5836-1
https://ubuntu.com/security/notices/USN-5963-1
https://www.cve.org/CVERecord?id=CVE-2023-0288
|
| vim-minimal |
CVE-2023-0433 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2023/Mar/17
http://seclists.org/fulldisclosure/2023/Mar/18
http://seclists.org/fulldisclosure/2023/Mar/21
https://access.redhat.com/security/cve/CVE-2023-0433
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0433
https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b
https://github.com/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b (v9.0.1225)
https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e
https://huntr.dev/bounties/ae933869-a1ec-402a-bbea-d51764c6618e/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4EX6N2DB75A73MQGVW3CS4VTNPAYVM2M/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/
https://nvd.nist.gov/vuln/detail/CVE-2023-0433
https://support.apple.com/kb/HT213670
https://support.apple.com/kb/HT213675
https://support.apple.com/kb/HT213677
https://ubuntu.com/security/notices/USN-5836-1
https://ubuntu.com/security/notices/USN-5963-1
https://www.cve.org/CVERecord?id=CVE-2023-0433
|
| vim-minimal |
CVE-2023-0512 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2023/Mar/17
http://seclists.org/fulldisclosure/2023/Mar/18
http://seclists.org/fulldisclosure/2023/Mar/21
https://access.redhat.com/security/cve/CVE-2023-0512
https://github.com/vim/vim/commit/870219c58c0804bdc55419b2e455c06ac715a835
https://huntr.dev/bounties/de83736a-1936-4872-830b-f1e9b0ad2a74
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
https://nvd.nist.gov/vuln/detail/CVE-2023-0512
https://support.apple.com/kb/HT213670
https://support.apple.com/kb/HT213675
https://support.apple.com/kb/HT213677
https://www.cve.org/CVERecord?id=CVE-2023-0512
|
| vim-minimal |
CVE-2023-1127 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-1127
https://github.com/vim/vim/commit/e0f869196930ef5f25a0ac41c9215b09c9ce2d3c
https://huntr.dev/bounties/2d4d309e-4c96-415f-9070-36d0815f1beb
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDVN5HSWPNVP4QXBPCEGZDLZKURLJWTE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ6TMKKBXHGVUHWFGM4X46VIJO7ZAG2W/
https://nvd.nist.gov/vuln/detail/CVE-2023-1127
https://www.cve.org/CVERecord?id=CVE-2023-1127
|
| vim-minimal |
CVE-2023-1170 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-1170
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1170
https://github.com/vim/vim/commit/1c73b65229c25e3c1fd8824ba958f7cc4d604f9c
https://github.com/vim/vim/commit/1c73b65229c25e3c1fd8824ba958f7cc4d604f9c (v9.0.1376)
https://huntr.dev/bounties/286e0090-e654-46d2-ac60-29f81799d0a4
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
https://nvd.nist.gov/vuln/detail/CVE-2023-1170
https://ubuntu.com/security/notices/USN-5963-1
https://www.cve.org/CVERecord?id=CVE-2023-1170
|
| vim-minimal |
CVE-2023-1175 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-1175
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1175
https://github.com/vim/vim/commit/c99cbf8f289bdda5d4a77d7ec415850a520330ba
https://github.com/vim/vim/commit/c99cbf8f289bdda5d4a77d7ec415850a520330ba (v9.0.1378)
https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e
https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
https://nvd.nist.gov/vuln/detail/CVE-2023-1175
https://ubuntu.com/security/notices/USN-5963-1
https://www.cve.org/CVERecord?id=CVE-2023-1175
|
| vim-minimal |
CVE-2023-1264 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-1264
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1264
https://github.com/vim/vim/commit/7ac5023a5f1a37baafbe1043645f97ba3443d9f6
https://github.com/vim/vim/commit/7ac5023a5f1a37baafbe1043645f97ba3443d9f6 (v9.0.1392)
https://huntr.dev/bounties/b2989095-88f3-413a-9a39-c1c58a6e6815
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
https://nvd.nist.gov/vuln/detail/CVE-2023-1264
https://ubuntu.com/security/notices/USN-5963-1
https://www.cve.org/CVERecord?id=CVE-2023-1264
|
| vim-minimal |
CVE-2023-2609 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-2609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2609
https://github.com/vim/vim/commit/d1ae8366aff286d41e7f5bc513cc0a1af5130aad
https://github.com/vim/vim/commit/d1ae8366aff286d41e7f5bc513cc0a1af5130aad (v9.0.1531)
https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/
https://nvd.nist.gov/vuln/detail/CVE-2023-2609
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6154-1
https://www.cve.org/CVERecord?id=CVE-2023-2609
|
| vim-minimal |
CVE-2023-2610 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-2610
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2610
https://github.com/vim/vim/commit/ab9a2d884b3a4abe319606ea95a5a6d6b01cd73a
https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d
https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/
https://nvd.nist.gov/vuln/detail/CVE-2023-2610
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
https://ubuntu.com/security/notices/USN-6154-1
https://www.cve.org/CVERecord?id=CVE-2023-2610
|
| vim-minimal |
CVE-2023-46246 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-46246
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46246
https://github.com/vim/vim/commit/9198c1f2b1ddecde22af918541e0de2a32f0f45a
https://github.com/vim/vim/commit/9198c1f2b1ddecde22af918541e0de2a32f0f45a (v9.0.2068)
https://github.com/vim/vim/security/advisories/GHSA-q22m-h7m2-9mgm
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNMFS3IH74KEMMESOA3EOB6MZ56TWGFF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVA7K73WHQH4KVFDJQ7ELIUD2WK5ZT5E/
https://nvd.nist.gov/vuln/detail/CVE-2023-46246
https://security.netapp.com/advisory/ntap-20231208-0006/
https://ubuntu.com/security/notices/USN-6557-1
https://www.cve.org/CVERecord?id=CVE-2023-46246
|
| vim-minimal |
CVE-2023-48231 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/11/16/1
https://access.redhat.com/security/cve/CVE-2023-48231
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48231
https://github.com/vim/vim/commit/25aabc2b8ee1e19ced6f4da9d866cf9378fc4c5a
https://github.com/vim/vim/commit/25aabc2b8ee1e19ced6f4da9d866cf9378fc4c5a (v9.0.2106)
https://github.com/vim/vim/security/advisories/GHSA-8g46-v9ff-c765
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
https://nvd.nist.gov/vuln/detail/CVE-2023-48231
https://security.netapp.com/advisory/ntap-20231227-0008/
https://ubuntu.com/security/notices/USN-6557-1
https://www.cve.org/CVERecord?id=CVE-2023-48231
|
| vim-minimal |
CVE-2023-48232 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/11/16/1
https://access.redhat.com/security/cve/CVE-2023-48232
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48232
https://github.com/vim/vim/commit/cb0b99f0672d8446585d26e998343dceca17d1ce
https://github.com/vim/vim/commit/cb0b99f0672d8446585d26e998343dceca17d1ce (v9.0.2107)
https://github.com/vim/vim/security/advisories/GHSA-f6cx-x634-hqpw
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
https://nvd.nist.gov/vuln/detail/CVE-2023-48232
https://security.netapp.com/advisory/ntap-20231227-0006/
https://ubuntu.com/security/notices/USN-6557-1
https://www.cve.org/CVERecord?id=CVE-2023-48232
|
| vim-minimal |
CVE-2023-48233 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/11/16/1
https://access.redhat.com/security/cve/CVE-2023-48233
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48233
https://github.com/vim/vim/commit/ac63787734fda2e294e477af52b3bd601517fa78
https://github.com/vim/vim/commit/ac63787734fda2e294e477af52b3bd601517fa78 (v9.0.2108)
https://github.com/vim/vim/security/advisories/GHSA-3xx4-hcq6-r2vj
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
https://nvd.nist.gov/vuln/detail/CVE-2023-48233
https://security.netapp.com/advisory/ntap-20231227-0003/
https://ubuntu.com/security/notices/USN-6557-1
https://www.cve.org/CVERecord?id=CVE-2023-48233
|
| vim-minimal |
CVE-2023-48234 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/11/16/1
https://access.redhat.com/security/cve/CVE-2023-48234
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48234
https://github.com/vim/vim/commit/58f9befca1fa172068effad7f2ea5a9d6a7b0cca
https://github.com/vim/vim/commit/58f9befca1fa172068effad7f2ea5a9d6a7b0cca (v9.0.2109)
https://github.com/vim/vim/security/advisories/GHSA-59gw-c949-6phq
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
https://nvd.nist.gov/vuln/detail/CVE-2023-48234
https://security.netapp.com/advisory/ntap-20231227-0004/
https://ubuntu.com/security/notices/USN-6557-1
https://www.cve.org/CVERecord?id=CVE-2023-48234
|
| vim-minimal |
CVE-2023-48235 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/11/16/1
https://access.redhat.com/security/cve/CVE-2023-48235
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48235
https://github.com/vim/vim/commit/060623e4a3bc72b011e7cd92bedb3bfb64e06200
https://github.com/vim/vim/commit/060623e4a3bc72b011e7cd92bedb3bfb64e06200 (v9.0.2110)
https://github.com/vim/vim/security/advisories/GHSA-6g74-hr6q-pr8g
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
https://nvd.nist.gov/vuln/detail/CVE-2023-48235
https://security.netapp.com/advisory/ntap-20231227-0007/
https://ubuntu.com/security/notices/USN-6557-1
https://www.cve.org/CVERecord?id=CVE-2023-48235
|
| vim-minimal |
CVE-2023-48236 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/11/16/1
https://access.redhat.com/security/cve/CVE-2023-48236
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48236
https://github.com/vim/vim/commit/73b2d3790cad5694fc0ed0db2926e4220c48d968
https://github.com/vim/vim/commit/73b2d3790cad5694fc0ed0db2926e4220c48d968 (v9.0.2111)
https://github.com/vim/vim/security/advisories/GHSA-pr4c-932v-8hx5
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
https://nvd.nist.gov/vuln/detail/CVE-2023-48236
https://security.netapp.com/advisory/ntap-20231227-0002/
https://ubuntu.com/security/notices/USN-6557-1
https://www.cve.org/CVERecord?id=CVE-2023-48236
|
| vim-minimal |
CVE-2023-48237 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/11/16/1
https://access.redhat.com/security/cve/CVE-2023-48237
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48237
https://github.com/vim/vim/commit/6bf131888a3d1de62bbfa8a7ea03c0ddccfd496e
https://github.com/vim/vim/commit/6bf131888a3d1de62bbfa8a7ea03c0ddccfd496e (v9.0.2112)
https://github.com/vim/vim/security/advisories/GHSA-f2m2-v387-gv87
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UJAK2W5S7G75ETDAEM3BDUCVSXCEGRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M3VQF7CL3V6FGSEW37WNDFBRRILR65AK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNRNYLWXZOGTYWE5HMFNQ5FVE3HBUHF6/
https://nvd.nist.gov/vuln/detail/CVE-2023-48237
https://security.netapp.com/advisory/ntap-20231227-0005/
https://ubuntu.com/security/notices/USN-6557-1
https://www.cve.org/CVERecord?id=CVE-2023-48237
|
| vim-minimal |
CVE-2023-48706 |
LOW |
2:7.4.629-8.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/11/22/3
https://access.redhat.com/security/cve/CVE-2023-48706
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48706
https://github.com/gandalf4a/crash_report/blob/main/vim/vim_huaf
https://github.com/vim/vim/commit/26c11c56888d01e298cd8044caf860f3c26f57bb
https://github.com/vim/vim/pull/13552
https://github.com/vim/vim/security/advisories/GHSA-c8qm-x72m-q53q
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DNMFS3IH74KEMMESOA3EOB6MZ56TWGFF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVA7K73WHQH4KVFDJQ7ELIUD2WK5ZT5E/
https://nvd.nist.gov/vuln/detail/CVE-2023-48706
https://security.netapp.com/advisory/ntap-20240105-0001/
https://ubuntu.com/security/notices/USN-6557-1
https://www.cve.org/CVERecord?id=CVE-2023-48706
|
| vim-minimal |
CVE-2023-5344 |
LOW |
2:7.4.629-8.el7_9 |
|
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://access.redhat.com/security/cve/CVE-2023-5344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5344
https://github.com/vim/vim/commit/3bd7fa12e146c6051490d048a4acbfba974eeb04
https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf
https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4W665GQBN6S6ZDMYWVF4X7KMFI7AQKJL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZOXBUJLJ5VSPN3YXWN7XZA4JDYKNE7GZ/
https://nvd.nist.gov/vuln/detail/CVE-2023-5344
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
https://ubuntu.com/security/notices/USN-6452-1
https://www.cve.org/CVERecord?id=CVE-2023-5344
|
| vim-minimal |
CVE-2023-5441 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-5441
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5441
https://github.com/vim/vim/commit/20d161ace307e28690229b68584f2d84556f8960
https://github.com/vim/vim/commit/20d161ace307e28690229b68584f2d84556f8960 (v9.0.1992)
https://huntr.dev/bounties/b54cbdf5-3e85-458d-bb38-9ea2c0b669f2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDDWD25AZIHBAA44HQT75OWLQ5UMDKU3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGTVLUV7UCXXCZAIQIUCLG6JXAVYT3HE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/
https://nvd.nist.gov/vuln/detail/CVE-2023-5441
https://ubuntu.com/security/notices/USN-6452-1
https://www.cve.org/CVERecord?id=CVE-2023-5441
|
| vim-minimal |
CVE-2023-5535 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2023-5535
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5535
https://github.com/vim/vim/commit/41e6f7d6ba67b61d911f9b1d76325cd79224753d
https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDDWD25AZIHBAA44HQT75OWLQ5UMDKU3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGTVLUV7UCXXCZAIQIUCLG6JXAVYT3HE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/
https://nvd.nist.gov/vuln/detail/CVE-2023-5535
https://ubuntu.com/security/notices/USN-6452-1
https://www.cve.org/CVERecord?id=CVE-2023-5535
|
| vim-minimal |
CVE-2024-22667 |
LOW |
2:7.4.629-8.el7_9 |
|
https://access.redhat.com/security/cve/CVE-2024-22667
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22667
https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt
https://github.com/vim/vim/commit/b39b240c386a5a29241415541f1c99e2e6b8ce47
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/
https://nvd.nist.gov/vuln/detail/CVE-2024-22667
https://security.netapp.com/advisory/ntap-20240223-0008/
https://www.cve.org/CVERecord?id=CVE-2024-22667
|
| wget |
CVE-2017-13089 |
HIGH |
1.14-10.el7 |
1.14-15.el7_4.1 |
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=d892291fb8ace4c3b734ea5125770989c215df3f
http://www.debian.org/security/2017/dsa-4008
http://www.securityfocus.com/bid/101592
http://www.securitytracker.com/id/1039661
https://access.redhat.com/errata/RHSA-2017:3075
https://access.redhat.com/security/cve/CVE-2017-13089
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089
https://github.com/r1b/CVE-2017-13089
https://linux.oracle.com/cve/CVE-2017-13089.html
https://linux.oracle.com/errata/ELSA-2017-3075.html
https://nvd.nist.gov/vuln/detail/CVE-2017-13089
https://security.gentoo.org/glsa/201711-06
https://ubuntu.com/security/notices/USN-3464-1
https://ubuntu.com/security/notices/USN-3464-2
https://www.cve.org/CVERecord?id=CVE-2017-13089
https://www.synology.com/support/security/Synology_SA_17_62_Wget
https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html
|
| wget |
CVE-2017-13090 |
HIGH |
1.14-10.el7 |
1.14-15.el7_4.1 |
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba
http://www.debian.org/security/2017/dsa-4008
http://www.securityfocus.com/bid/101590
http://www.securitytracker.com/id/1039661
https://access.redhat.com/errata/RHSA-2017:3075
https://access.redhat.com/security/cve/CVE-2017-13090
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090
https://linux.oracle.com/cve/CVE-2017-13090.html
https://linux.oracle.com/errata/ELSA-2017-3075.html
https://nvd.nist.gov/vuln/detail/CVE-2017-13090
https://security.gentoo.org/glsa/201711-06
https://ubuntu.com/security/notices/USN-3464-1
https://ubuntu.com/security/notices/USN-3464-2
https://www.cve.org/CVERecord?id=CVE-2017-13090
https://www.synology.com/support/security/Synology_SA_17_62_Wget
https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html
|
| wget |
CVE-2019-5953 |
HIGH |
1.14-10.el7 |
1.14-18.el7_6.1 |
http://jvn.jp/en/jp/JVN25261088/index.html
https://access.redhat.com/errata/RHSA-2019:2979
https://access.redhat.com/errata/RHSA-2019:3168
https://access.redhat.com/security/cve/CVE-2019-5953
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953
https://jvn.jp/en/jp/JVN25261088/
https://linux.oracle.com/cve/CVE-2019-5953.html
https://linux.oracle.com/errata/ELSA-2019-1228.html
https://lists.gnu.org/archive/html/bug-wget/2019-04/msg00001.html
https://nvd.nist.gov/vuln/detail/CVE-2019-5953
https://security.gentoo.org/glsa/201908-19
https://support.f5.com/csp/article/K14560101
https://ubuntu.com/security/notices/USN-3943-1
https://ubuntu.com/security/notices/USN-3943-2
https://www.cve.org/CVERecord?id=CVE-2019-5953
https://www.gnu.org/software/wget/
|
| wget |
CVE-2014-4877 |
MEDIUM |
1.14-10.el7 |
1.14-10.el7_0.1 |
http://advisories.mageia.org/MGASA-2014-0431.html
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=b4440d96cf8173d68ecaa07c36b8f4316ee794d0
http://lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html
http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html
http://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html
http://rhn.redhat.com/errata/RHSA-2014-1764.html
http://rhn.redhat.com/errata/RHSA-2014-1955.html
http://security.gentoo.org/glsa/glsa-201411-05.xml
http://www.debian.org/security/2014/dsa-3062
http://www.kb.cert.org/vuls/id/685996
http://www.mandriva.com/security/advisories?name=MDVSA-2015:121
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.securityfocus.com/bid/70751
http://www.ubuntu.com/usn/USN-2393-1
https://access.redhat.com/security/cve/CVE-2014-4877
https://bugzilla.redhat.com/show_bug.cgi?id=1139181
https://community.rapid7.com/community/metasploit/blog/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877
https://github.com/rapid7/metasploit-framework/pull/4088
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://kc.mcafee.com/corporate/index?page=content&id=SB10106
https://linux.oracle.com/cve/CVE-2014-4877.html
https://linux.oracle.com/errata/ELSA-2014-1764.html
https://nvd.nist.gov/vuln/detail/CVE-2014-4877
https://ubuntu.com/security/notices/USN-2393-1
https://www.cve.org/CVERecord?id=CVE-2014-4877
|
| wget |
CVE-2016-4971 |
MEDIUM |
1.14-10.el7 |
1.14-13.el7 |
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=e996e322ffd42aaa051602da182d03178d0f13e1
http://lists.gnu.org/archive/html/info-gnu/2016-06/msg00004.html
http://lists.opensuse.org/opensuse-updates/2016-08/msg00043.html
http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html
http://rhn.redhat.com/errata/RHSA-2016-2587.html
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
http://www.securityfocus.com/bid/91530
http://www.securitytracker.com/id/1036133
http://www.ubuntu.com/usn/USN-3012-1
https://access.redhat.com/security/cve/CVE-2016-4971
https://bugzilla.redhat.com/show_bug.cgi?id=1343666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971
https://linux.oracle.com/cve/CVE-2016-4971.html
https://linux.oracle.com/errata/ELSA-2016-2587.html
https://nvd.nist.gov/vuln/detail/CVE-2016-4971
https://security.gentoo.org/glsa/201610-11
https://security.paloaltonetworks.com/CVE-2016-4971
https://ubuntu.com/security/notices/USN-3012-1
https://www.cve.org/CVERecord?id=CVE-2016-4971
https://www.exploit-db.com/exploits/40064/
|
| wget |
CVE-2018-0494 |
MEDIUM |
1.14-10.el7 |
1.14-18.el7 |
http://www.securityfocus.com/bid/104129
http://www.securitytracker.com/id/1040838
https://access.redhat.com/errata/RHSA-2018:3052
https://access.redhat.com/security/cve/CVE-2018-0494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494
https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
https://linux.oracle.com/cve/CVE-2018-0494.html
https://linux.oracle.com/errata/ELSA-2018-3052.html
https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html
https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html
https://nvd.nist.gov/vuln/detail/CVE-2018-0494
https://savannah.gnu.org/bugs/?53763
https://security.gentoo.org/glsa/201806-01
https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt
https://ubuntu.com/security/notices/USN-3643-1
https://ubuntu.com/security/notices/USN-3643-2
https://usn.ubuntu.com/3643-1/
https://usn.ubuntu.com/3643-2/
https://www.cve.org/CVERecord?id=CVE-2018-0494
https://www.debian.org/security/2018/dsa-4195
https://www.exploit-db.com/exploits/44601/
|
| wget |
CVE-2021-31879 |
MEDIUM |
1.14-10.el7 |
|
https://access.redhat.com/security/cve/CVE-2021-31879
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879
https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html
https://nvd.nist.gov/vuln/detail/CVE-2021-31879
https://savannah.gnu.org/bugs/?56909
https://security.netapp.com/advisory/ntap-20210618-0002/
https://www.cve.org/CVERecord?id=CVE-2021-31879
|
| wget |
CVE-2017-6508 |
LOW |
1.14-10.el7 |
|
http://git.savannah.gnu.org/cgit/wget.git/commit/?id=4d729e322fae359a1aefaafec1144764a54e8ad4
http://lists.gnu.org/archive/html/bug-wget/2017-03/msg00018.html
http://www.securityfocus.com/bid/96877
https://access.redhat.com/security/cve/CVE-2017-6508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6508
https://nvd.nist.gov/vuln/detail/CVE-2017-6508
https://security.gentoo.org/glsa/201706-16
https://ubuntu.com/security/notices/USN-3464-1
https://ubuntu.com/security/notices/USN-3464-2
https://www.cve.org/CVERecord?id=CVE-2017-6508
|
| xerces-j2 |
CVE-2022-23437 |
MEDIUM |
2.11.0-17.el7_0 |
|
http://www.openwall.com/lists/oss-security/2022/01/24/3
https://access.redhat.com/security/cve/CVE-2022-23437
https://github.com/jboss/xerces
https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xxx9-3xcr-gjj3
https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ
https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl
https://nvd.nist.gov/vuln/detail/CVE-2022-23437
https://security.netapp.com/advisory/ntap-20221028-0005
https://security.netapp.com/advisory/ntap-20221028-0005/
https://www.cve.org/CVERecord?id=CVE-2022-23437
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujul2022.html
|
| zlib |
CVE-2023-45853 |
MEDIUM |
1.2.7-21.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/20/9
http://www.openwall.com/lists/oss-security/2024/01/24/10
https://access.redhat.com/security/cve/CVE-2023-45853
https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45853
https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4
https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c
https://github.com/madler/zlib/pull/843
https://github.com/smihica/pyminizip
https://github.com/smihica/pyminizip/blob/master/zlib-1.2.11/contrib/minizip/zip.c
https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2023-45853
https://pypi.org/project/pyminizip/#history
https://security.gentoo.org/glsa/202401-18
https://security.netapp.com/advisory/ntap-20231130-0009
https://security.netapp.com/advisory/ntap-20231130-0009/
https://www.cve.org/CVERecord?id=CVE-2023-45853
https://www.winimage.com/zLibDll/minizip.html
|
| zlib-devel |
CVE-2023-45853 |
MEDIUM |
1.2.7-21.el7_9 |
|
http://www.openwall.com/lists/oss-security/2023/10/20/9
http://www.openwall.com/lists/oss-security/2024/01/24/10
https://access.redhat.com/security/cve/CVE-2023-45853
https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45853
https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4
https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c
https://github.com/madler/zlib/pull/843
https://github.com/smihica/pyminizip
https://github.com/smihica/pyminizip/blob/master/zlib-1.2.11/contrib/minizip/zip.c
https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2023-45853
https://pypi.org/project/pyminizip/#history
https://security.gentoo.org/glsa/202401-18
https://security.netapp.com/advisory/ntap-20231130-0009
https://security.netapp.com/advisory/ntap-20231130-0009/
https://www.cve.org/CVERecord?id=CVE-2023-45853
https://www.winimage.com/zLibDll/minizip.html
|
| No Misconfigurations found |
| org.apache.tomcat:tomcat-catalina |
CVE-2016-5388 |
HIGH |
7.0.69 |
7.0.72, 8.5.5 |
http://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
http://rhn.redhat.com/errata/RHSA-2016-1624.html
http://rhn.redhat.com/errata/RHSA-2016-2045.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://www.kb.cert.org/vuls/id/797896
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/91818
http://www.securitytracker.com/id/1036331
https://access.redhat.com/errata/RHSA-2016:1624
https://access.redhat.com/errata/RHSA-2016:1635
https://access.redhat.com/errata/RHSA-2016:1636
https://access.redhat.com/errata/RHSA-2016:2045
https://access.redhat.com/errata/RHSA-2016:2046
https://access.redhat.com/security/cve/CVE-2016-5388
https://bugzilla.redhat.com/show_bug.cgi?id=1353809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/1b91e91194a095ea922f96d1dccddf6fbc446e54
https://github.com/apache/tomcat/commit/880250877b0643956435282afb9c111450cfff4c
https://github.com/apache/tomcat/commit/fb3569fbb9a2f55459aa8e1e22bc35a737e66329
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324759
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://httpoxy.org/
https://linux.oracle.com/cve/CVE-2016-5388.html
https://linux.oracle.com/errata/ELSA-2016-2046.html
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6b414817c2b0bf351138911c8c922ec5dd577ebc0b9a7f42d705752d@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1%40%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E
https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r2853582063cfd9e7fbae1e029ae004e6a83482ae9b70a698996353dd@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc6b2147532416cc736e68a32678d3947b7053c3085cf43a9874fd102@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf21b368769ae70de4dee840a3228721ae442f1d51ad8742003aefe39@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html
https://lists.opensuse.org/opensuse-updates/2016-09/msg00025.html
https://nvd.nist.gov/vuln/detail/CVE-2016-5388
https://rhn.redhat.com/errata/RHSA-2016-1624.html
https://rhn.redhat.com/errata/RHSA-2016-2045.html
https://rhn.redhat.com/errata/RHSA-2016-2046.html
https://tomcat.apache.org/tomcat-7.0-doc/changelog.html
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4791-1
https://www.apache.org/security/asf-httpoxy-response.txt
https://www.cve.org/CVERecord?id=CVE-2016-5388
https://www.kb.cert.org/vuls/id/797896
|
| org.apache.tomcat:tomcat-catalina |
CVE-2017-12616 |
HIGH |
7.0.69 |
7.0.81 |
http://www.securityfocus.com/bid/100897
http://www.securitytracker.com/id/1039393
https://access.redhat.com/errata/RHSA-2018:0465
https://access.redhat.com/errata/RHSA-2018:0466
https://access.redhat.com/security/cve/CVE-2017-12616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12616
https://github.com/apache/tomcat
https://lists.apache.org/thread.html/1df9b4552464caa42047062fe7175da0da06c18ecc8daf99258bbda6%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/1df9b4552464caa42047062fe7175da0da06c18ecc8daf99258bbda6@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html
https://nvd.nist.gov/vuln/detail/CVE-2017-12616
https://security.netapp.com/advisory/ntap-20171018-0001
https://security.netapp.com/advisory/ntap-20171018-0001/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03828en_us
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81
https://ubuntu.com/security/notices/USN-3665-1
https://usn.ubuntu.com/3665-1
https://usn.ubuntu.com/3665-1/
https://www.cve.org/CVERecord?id=CVE-2017-12616
https://www.synology.com/support/security/Synology_SA_17_54_Tomcat
|
| org.apache.tomcat:tomcat-catalina |
CVE-2020-9484 |
HIGH |
7.0.69 |
10.0.0-M5, 9.0.35, 8.5.55, 7.0.104 |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00057.html
http://mail-archives.apache.org/mod_mbox/tomcat-announce/202005.mbox/%3Ce3a0a517-bf82-ba62-0af6-24b83ea0e4e2%40apache.org%3E
http://packetstormsecurity.com/files/157924/Apache-Tomcat-CVE-2020-9484-Proof-Of-Concept.html
http://seclists.org/fulldisclosure/2020/Jun/6
http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M5
http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.104
http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.55
http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.35
http://www.openwall.com/lists/oss-security/2021/03/01/2
https://access.redhat.com/security/cve/CVE-2020-9484
https://bugzilla.suse.com/show_bug.cgi?id=1171928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484
https://github.com/apache/tomcat
https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222 (9.0.35)
https://github.com/apache/tomcat/commit/3aa8f28db7efb311cdd1b6fe15a9cd3b167a2222.patch
https://github.com/apache/tomcat/commit/4785433a226a20df6acbea49296e1ce7e23de453
https://github.com/apache/tomcat/commit/53e30390943c18fca0c9e57dbcc14f1c623cfd06 (7.0.104)
https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4
https://github.com/apache/tomcat/commit/74b105657ffbd1d1de80455f03446c3bbf30d1f5
https://github.com/apache/tomcat/commit/93f0cc403a9210d469afc2bd9cf03ab3251c6f35
https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b
https://github.com/apache/tomcat/commit/bb33048e3f9b4f2b70e4da2e6c4e34ca89023b1b (10.0.0-M5)
https://github.com/apache/tomcat/commit/ec08af18d0f9ddca3f2d800ef66fe7fd20afef2f (8.5.55)
https://kc.mcafee.com/corporate/index?page=content&id=SB10332
https://linux.oracle.com/cve/CVE-2020-9484.html
https://linux.oracle.com/errata/ELSA-2020-2530.html
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r123b3ebe389f46f9d337923f393cdae4d3e9b78d982d706712f0898c@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r26950738f4b4ca2d256597cf391d52d3450fa665c297ea5ca38f5469@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r77eae567ed829da9012cadb29af17f2df8fa23bf66faf88229857bb1%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r7bc247fffcb1d58415215c861d2354bd653c86266230d78a93c71ae2@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r8dd19c514face6dd85fd4eab0271854883f40c7307926c1f7cd5400c@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/raa4123e472175bb052fbba165d37187cea923f755e8f3f30d124cb3f@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc1778b38e74b5b6142414d57623bd55b023a72361f422836782fca3c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc8473b08abdf3c16494ed817bec1717a0ee0c8080315bc27db5f21c3@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119%40%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf59c72572b9fee674a5d5cc6afeca4ffc3918a02c354a81cc50b7119@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf70f53af27e04869bdac18b1fc14a3ee529e59eb12292c8791a77926@%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cusers.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/05/msg00020.html
https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html
https://lists.debian.org/debian-lts-announce/2020/07/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GIQHXENTLYUNOES4LXVNJ2NCUQQRF5VJ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJ7XHKWJWDNWXUJH6UB7CLIW4TWOZ26N
https://nvd.nist.gov/vuln/detail/CVE-2020-9484
https://security.gentoo.org/glsa/202006-21
https://security.netapp.com/advisory/ntap-20200528-0005
https://security.netapp.com/advisory/ntap-20200528-0005/
https://tomcat.apache.org/security-10.html
https://tomcat.apache.org/security-7.html
https://tomcat.apache.org/security-8.html
https://tomcat.apache.org/security-9.html
https://ubuntu.com/security/notices/USN-4448-1
https://ubuntu.com/security/notices/USN-4596-1
https://ubuntu.com/security/notices/USN-5360-1
https://usn.ubuntu.com/4448-1
https://usn.ubuntu.com/4448-1/
https://usn.ubuntu.com/4596-1
https://usn.ubuntu.com/4596-1/
https://www.cve.org/CVERecord?id=CVE-2020-9484
https://www.debian.org/security/2020/dsa-4727
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| org.apache.tomcat:tomcat-coyote |
CVE-2016-6816 |
HIGH |
7.0.69 |
9.0.0.M12, 8.5.8, 8.0.39, 7.0.73, 6.0.48 |
http://rhn.redhat.com/errata/RHSA-2017-0244.html
http://rhn.redhat.com/errata/RHSA-2017-0245.html
http://rhn.redhat.com/errata/RHSA-2017-0246.html
http://rhn.redhat.com/errata/RHSA-2017-0247.html
http://rhn.redhat.com/errata/RHSA-2017-0250.html
http://rhn.redhat.com/errata/RHSA-2017-0457.html
http://rhn.redhat.com/errata/RHSA-2017-0527.html
http://www.debian.org/security/2016/dsa-3738
http://www.openwall.com/lists/oss-security/2016/11/22/17
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.securityfocus.com/bid/94461
http://www.securitytracker.com/id/1037332
https://access.redhat.com/articles/2991951
https://access.redhat.com/errata/RHSA-2017:0455
https://access.redhat.com/errata/RHSA-2017:0456
https://access.redhat.com/errata/RHSA-2017:0935
https://access.redhat.com/security/cve/CVE-2016-6816
https://access.redhat.com/solutions/2891171
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816
https://github.com/apache/tomcat/commit/516bda676ac8d0284da3e0295a7df70391315360
https://github.com/apache/tomcat/commit/cdc0a935c2173aff60039a0b85e57a461381107c
https://github.com/apache/tomcat/commit/f96f5751d418ae5a2f550be040daf9c5f7d99256
https://github.com/apache/tomcat80/commit/779d5d34e68e50d2f721897050b147106992f566
https://linux.oracle.com/cve/CVE-2016-6816.html
https://linux.oracle.com/errata/ELSA-2017-0935.html
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
https://nvd.nist.gov/vuln/detail/CVE-2016-6816
https://security.netapp.com/advisory/ntap-20180607-0001
https://security.netapp.com/advisory/ntap-20180607-0001/
https://svn.apache.org/viewvc?view=revision&revision=1767641
https://svn.apache.org/viewvc?view=revision&revision=1767645
https://svn.apache.org/viewvc?view=revision&revision=1767653
https://svn.apache.org/viewvc?view=revision&revision=1767675
https://svn.apache.org/viewvc?view=revision&revision=1767683
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8
https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13
https://ubuntu.com/security/notices/USN-3177-1
https://ubuntu.com/security/notices/USN-4557-1
https://usn.ubuntu.com/4557-1
https://usn.ubuntu.com/4557-1/
https://web.archive.org/web/20161204121236/http://www.securityfocus.com/bid/94461
https://web.archive.org/web/20170929085438/http://www.securitytracker.com/id/1037332
https://www.cve.org/CVERecord?id=CVE-2016-6816
https://www.exploit-db.com/exploits/41783
https://www.exploit-db.com/exploits/41783/
|
| No Misconfigurations found |
| bl |
CVE-2020-8244 |
MEDIUM |
0.9.1 |
1.2.3, 2.2.1, 3.0.1, 4.0.3 |
https://access.redhat.com/security/cve/CVE-2020-8244
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8244
https://github.com/rvagg/bl/commit/8a8c13c880e2bef519133ea43e0e9b78b5d0c91e
https://github.com/rvagg/bl/commit/d3e240e3b8ba4048d3c76ef5fb9dd1f8872d3190
https://github.com/rvagg/bl/commit/dacc4ac7d5fcd6201bcf26fbd886951be9537466
https://hackerone.com/reports/966347
https://lists.debian.org/debian-lts-announce/2021/06/msg00028.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8244
https://ubuntu.com/security/notices/USN-5098-1
https://ubuntu.com/security/notices/USN-5159-1
https://www.cve.org/CVERecord?id=CVE-2020-8244
|
| bl |
GHSA-wrw9-m778-g6mc |
MEDIUM |
0.9.1 |
0.9.5, 1.0.1 |
https://github.com/rvagg/bl/pull/22
https://www.npmjs.com/advisories/596
|
| bl |
NSWG-ECO-391 |
MEDIUM |
0.9.1 |
>=1.0.1, >=0.9.5 <1.0.0 |
https://github.com/rvagg/bl/pull/22
|
| chownr |
CVE-2017-18869 |
LOW |
0.0.1 |
1.1.0 |
https://access.redhat.com/security/cve/CVE-2017-18869
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985
https://bugzilla.redhat.com/show_bug.cgi?id=1611614
https://github.com/isaacs/chownr/commit/36a93e3f0a220062c47b237cf6ab6d5f55cd79c9
https://github.com/isaacs/chownr/commit/a631d841022880e5c8d694408a7e96d6d576d0ce
https://github.com/isaacs/chownr/issues/14
https://nvd.nist.gov/vuln/detail/CVE-2017-18869
https://snyk.io/vuln/npm:chownr:20180731
https://www.cve.org/CVERecord?id=CVE-2017-18869
|
| fstream |
CVE-2019-13173 |
HIGH |
1.0.2 |
1.0.12 |
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00052.html
https://access.redhat.com/security/cve/CVE-2019-13173
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13173
https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22
https://nvd.nist.gov/vuln/detail/CVE-2019-13173
https://ubuntu.com/security/notices/USN-4123-1
https://usn.ubuntu.com/4123-1
https://usn.ubuntu.com/4123-1/
https://www.cve.org/CVERecord?id=CVE-2019-13173
https://www.npmjs.com/advisories/886
|
| hawk |
CVE-2022-29167 |
HIGH |
1.1.1 |
9.0.1 |
https://access.redhat.com/security/cve/CVE-2022-29167
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29167
https://github.com/mozilla/hawk
https://github.com/mozilla/hawk/commit/ade134119bf1fdc4909d00f5a952c966f0075ad3
https://github.com/mozilla/hawk/commit/d10d72ca82db967f6c5fcf866ff78e3ca25ce1ab
https://github.com/mozilla/hawk/pull/286
https://github.com/mozilla/hawk/security/advisories/GHSA-44pw-h2cw-w3vq
https://nvd.nist.gov/vuln/detail/CVE-2022-29167
https://ubuntu.com/security/notices/USN-6116-1
https://www.cve.org/CVERecord?id=CVE-2022-29167
|
| hawk |
CVE-2016-2515 |
MEDIUM |
1.1.1 |
>=3.1.3 < 4.0.0, >=4.1.1 |
http://www.openwall.com/lists/oss-security/2016/02/20/1
http://www.openwall.com/lists/oss-security/2016/02/20/2
https://access.redhat.com/security/cve/CVE-2016-2515
https://bugzilla.redhat.com/show_bug.cgi?id=1309721
https://github.com/advisories/GHSA-jcpv-g9rr-qxrc
https://github.com/hueniverse/hawk
https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa
https://github.com/hueniverse/hawk/issues/168
https://nodesecurity.io/advisories/77
https://nvd.nist.gov/vuln/detail/CVE-2016-2515
https://www.cve.org/CVERecord?id=CVE-2016-2515
https://www.npmjs.com/advisories/77
https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS
|
| hoek |
CVE-2020-36604 |
HIGH |
0.9.1 |
|
https://access.redhat.com/security/cve/CVE-2020-36604
https://github.com/advisories/GHSA-c429-5p7v-vgjp
https://github.com/hapijs/hoek/commit/4d0804bc6135ad72afdc5e1ec002b935b2f5216a
https://github.com/hapijs/hoek/commit/948baf98634a5c206875b67d11368f133034fa90
https://github.com/hapijs/hoek/issues/352
https://nvd.nist.gov/vuln/detail/CVE-2020-36604
https://security.snyk.io/vuln/SNYK-JS-HAPIHOEK-548452%29
https://www.cve.org/CVERecord?id=CVE-2020-36604
|
| hoek |
CVE-2018-3728 |
LOW |
0.9.1 |
>=5.0.3 >=4.2.1 |
http://www.securityfocus.com/bid/103108
https://access.redhat.com/errata/RHSA-2018:1263
https://access.redhat.com/errata/RHSA-2018:1264
https://access.redhat.com/security/cve/CVE-2018-3728
https://github.com/advisories/GHSA-jp4x-w63m-7wgm
https://github.com/hapijs/hoek/commit/32ed5c9413321fbc37da5ca81a7cbab693786dee
https://hackerone.com/reports/310439
https://nodesecurity.io/advisories/566
https://nvd.nist.gov/vuln/detail/CVE-2018-3728
https://snyk.io/vuln/npm:hoek:20180212
https://www.cve.org/CVERecord?id=CVE-2018-3728
https://www.npmjs.com/advisories/566
|
| ini |
CVE-2020-7788 |
HIGH |
1.2.1 |
1.3.6 |
https://access.redhat.com/errata/RHSA-2022:6595
https://access.redhat.com/security/cve/CVE-2020-7788
https://bugzilla.redhat.com/1907444
https://bugzilla.redhat.com/1945459
https://bugzilla.redhat.com/1964461
https://bugzilla.redhat.com/2007557
https://bugzilla.redhat.com/2098556
https://bugzilla.redhat.com/2102001
https://bugzilla.redhat.com/2105422
https://bugzilla.redhat.com/2105426
https://bugzilla.redhat.com/2105428
https://bugzilla.redhat.com/2105430
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788
https://errata.almalinux.org/9/ALSA-2022-6595.html
https://github.com/npm/ini
https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1
https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1 (v1.3.6)
https://linux.oracle.com/cve/CVE-2020-7788.html
https://linux.oracle.com/errata/ELSA-2022-6595.html
https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html
https://nvd.nist.gov/vuln/detail/CVE-2020-7788
https://snyk.io/vuln/SNYK-JS-INI-1048974
https://www.cve.org/CVERecord?id=CVE-2020-7788
https://www.npmjs.com/advisories/1589
|
| mime |
CVE-2017-16138 |
HIGH |
1.2.11 |
2.0.3, 1.4.1 |
https://access.redhat.com/security/cve/CVE-2017-16138
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138
https://github.com/broofa/mime
https://github.com/broofa/mime/commit/1df903fdeb9ae7eaa048795b8d580ce2c98f40b0
https://github.com/broofa/mime/commit/855d0c4b8b22e4a80b9401a81f2872058eae274d
https://github.com/broofa/node-mime/commit/1df903fdeb9ae7eaa048795b8d580ce2c98f40b0 (2.x)
https://github.com/broofa/node-mime/commit/855d0c4b8b22e4a80b9401a81f2872058eae274d (1.x)
https://github.com/broofa/node-mime/issues/167
https://nodesecurity.io/advisories/535
https://nvd.nist.gov/vuln/detail/CVE-2017-16138
https://www.cve.org/CVERecord?id=CVE-2017-16138
|
| minimatch |
CVE-2016-10540 |
HIGH |
1.0.0 |
3.0.2 |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10540
https://github.com/advisories/GHSA-hxm2-r34f-qmc5
https://nodesecurity.io/advisories/118
https://nvd.nist.gov/vuln/detail/CVE-2016-10540
https://www.npmjs.com/advisories/118
|
| minimatch |
CVE-2022-3517 |
HIGH |
1.0.0 |
3.0.5 |
https://access.redhat.com/errata/RHSA-2023:0321
https://access.redhat.com/security/cve/CVE-2022-3517
https://bugzilla.redhat.com/2066009
https://bugzilla.redhat.com/2130518
https://bugzilla.redhat.com/2134609
https://bugzilla.redhat.com/2140911
https://bugzilla.redhat.com/show_bug.cgi?id=2066009
https://bugzilla.redhat.com/show_bug.cgi?id=2130518
https://bugzilla.redhat.com/show_bug.cgi?id=2134609
https://bugzilla.redhat.com/show_bug.cgi?id=2140911
https://bugzilla.redhat.com/show_bug.cgi?id=2142808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548
https://errata.almalinux.org/9/ALSA-2023-0321.html
https://errata.rockylinux.org/RLSA-2023:0321
https://github.com/grafana/grafana-image-renderer/issues/329
https://github.com/isaacs/minimatch
https://github.com/isaacs/minimatch/commit/a8763f4388e51956be62dc6025cec1126beeb5e6
https://github.com/isaacs/minimatch/commit/a8763f4388e51956be62dc6025cec1126beeb5e6 (v3.0.5)
https://github.com/nodejs/node/issues/42510
https://linux.oracle.com/cve/CVE-2022-3517.html
https://linux.oracle.com/errata/ELSA-2023-1743.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00011.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTEUUTNIEBHGKUKKLNUZSV7IEP6IP3Q3
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UM6XJ73Q3NAM5KSGCOKJ2ZIA6GUWUJLK
https://nvd.nist.gov/vuln/detail/CVE-2022-3517
https://ubuntu.com/security/notices/USN-6086-1
https://www.cve.org/CVERecord?id=CVE-2022-3517
|
| minimatch |
NSWG-ECO-118 |
HIGH |
1.0.0 |
>=3.0.2 |
https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS
|
| minimist |
CVE-2021-44906 |
CRITICAL |
0.0.8 |
1.2.6, 0.2.4 |
https://access.redhat.com/errata/RHSA-2023:0321
https://access.redhat.com/security/cve/CVE-2021-44906
https://bugzilla.redhat.com/2066009
https://bugzilla.redhat.com/2130518
https://bugzilla.redhat.com/2134609
https://bugzilla.redhat.com/2140911
https://bugzilla.redhat.com/show_bug.cgi?id=2066009
https://bugzilla.redhat.com/show_bug.cgi?id=2130518
https://bugzilla.redhat.com/show_bug.cgi?id=2134609
https://bugzilla.redhat.com/show_bug.cgi?id=2140911
https://bugzilla.redhat.com/show_bug.cgi?id=2142808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548
https://errata.almalinux.org/9/ALSA-2023-0321.html
https://errata.rockylinux.org/RLSA-2023:0321
https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/minimist%20PoC.zip
https://github.com/advisories/GHSA-xvch-5gv4-984h
https://github.com/minimistjs/minimist/commit/34e20b8461118608703d6485326abbb8e35e1703
https://github.com/minimistjs/minimist/commit/bc8ecee43875261f4f17eb20b1243d3ed15e70eb
https://github.com/minimistjs/minimist/commit/c2b981977fa834b223b408cfb860f933c9811e4d
https://github.com/minimistjs/minimist/commit/ef9153fc52b6cea0744b2239921c5dcae4697f11
https://github.com/minimistjs/minimist/commits/v0.2.4
https://github.com/minimistjs/minimist/issues/11
https://github.com/minimistjs/minimist/pull/24
https://github.com/substack/minimist
https://github.com/substack/minimist/blob/master/index.js#L69
https://github.com/substack/minimist/issues/164
https://linux.oracle.com/cve/CVE-2021-44906.html
https://linux.oracle.com/errata/ELSA-2023-0321.html
https://nvd.nist.gov/vuln/detail/CVE-2021-44906
https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://stackoverflow.com/questions/8588563/adding-custom-properties-to-a-function/20278068#20278068
https://www.cve.org/CVERecord?id=CVE-2021-44906
|
| minimist |
CVE-2020-7598 |
MEDIUM |
0.0.8 |
0.2.1, 1.2.3 |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html
https://access.redhat.com/security/cve/CVE-2020-7598
https://errata.almalinux.org/8/ALSA-2020-2852.html
https://github.com/minimistjs/minimist/commit/10bd4cdf49d9686d48214be9d579a9cdfda37c68
https://github.com/minimistjs/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab
https://github.com/minimistjs/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95
https://github.com/minimistjs/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94
https://github.com/substack/minimist
https://linux.oracle.com/cve/CVE-2020-7598.html
https://linux.oracle.com/errata/ELSA-2020-2852.html
https://nvd.nist.gov/vuln/detail/CVE-2020-7598
https://snyk.io/vuln/SNYK-JS-MINIMIST-559764
https://www.cve.org/CVERecord?id=CVE-2020-7598
https://www.npmjs.com/advisories/1179
|
| node-uuid |
CVE-2015-8851 |
MEDIUM |
1.4.1 |
>=1.4.4 |
http://www.openwall.com/lists/oss-security/2016/04/13/8
https://access.redhat.com/security/cve/CVE-2015-8851
https://bugzilla.redhat.com/show_bug.cgi?id=1327056
https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d
https://github.com/broofa/node-uuid/issues/108
https://github.com/broofa/node-uuid/issues/122
https://nodesecurity.io/advisories/93
https://nvd.nist.gov/vuln/detail/CVE-2015-8851
https://www.cve.org/CVERecord?id=CVE-2015-8851
https://www.npmjs.com/advisories/93
|
| npm |
CVE-2018-7408 |
HIGH |
1.4.29 |
5.7.1 |
github.com/npm/cli
http://blog.npmjs.org/post/171169301000/v571
https://github.com/npm/npm/commit/74e149da6efe6ed89477faa81fef08eee7999ad0
https://github.com/npm/npm/issues/19883
https://nvd.nist.gov/vuln/detail/CVE-2018-7408
|
| npm |
CVE-2019-16775 |
HIGH |
1.4.29 |
6.13.3 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html
https://access.redhat.com/errata/RHEA-2020:0330
https://access.redhat.com/errata/RHSA-2020:0573
https://access.redhat.com/errata/RHSA-2020:0579
https://access.redhat.com/errata/RHSA-2020:0597
https://access.redhat.com/errata/RHSA-2020:0602
https://access.redhat.com/security/cve/CVE-2019-16775
https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli
https://errata.almalinux.org/8/ALSA-2020-0579.html
https://github.com/advisories/GHSA-m6cx-g6qm-p2cx
https://github.com/npm/cli
https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx
https://linux.oracle.com/cve/CVE-2019-16775.html
https://linux.oracle.com/errata/ELSA-2020-0579.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP
https://nvd.nist.gov/vuln/detail/CVE-2019-16775
https://www.cve.org/CVERecord?id=CVE-2019-16775
https://www.npmjs.com/advisories/1434
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| npm |
CVE-2019-16776 |
HIGH |
1.4.29 |
6.13.3 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html
https://access.redhat.com/errata/RHEA-2020:0330
https://access.redhat.com/errata/RHSA-2020:0573
https://access.redhat.com/errata/RHSA-2020:0579
https://access.redhat.com/errata/RHSA-2020:0597
https://access.redhat.com/errata/RHSA-2020:0602
https://access.redhat.com/security/cve/CVE-2019-16776
https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli
https://errata.almalinux.org/8/ALSA-2020-0579.html
https://github.com/advisories/GHSA-x8qc-rrcw-4r46
https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46
https://linux.oracle.com/cve/CVE-2019-16776.html
https://linux.oracle.com/errata/ELSA-2020-0579.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP
https://nvd.nist.gov/vuln/detail/CVE-2019-16776
https://www.cve.org/CVERecord?id=CVE-2019-16776
https://www.npmjs.com/advisories/1436
https://www.oracle.com/security-alerts/cpujan2020.html
|
| npm |
CVE-2019-16777 |
HIGH |
1.4.29 |
6.13.4 |
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html
https://access.redhat.com/errata/RHEA-2020:0330
https://access.redhat.com/errata/RHSA-2020:0573
https://access.redhat.com/errata/RHSA-2020:0579
https://access.redhat.com/errata/RHSA-2020:0597
https://access.redhat.com/errata/RHSA-2020:0602
https://access.redhat.com/security/cve/CVE-2019-16777
https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli
https://errata.almalinux.org/8/ALSA-2020-0579.html
https://github.com/advisories/GHSA-4328-8hgf-7wjr
https://github.com/npm/cli
https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr
https://linux.oracle.com/cve/CVE-2019-16777.html
https://linux.oracle.com/errata/ELSA-2020-0579.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP
https://nvd.nist.gov/vuln/detail/CVE-2019-16777
https://security.gentoo.org/glsa/202003-48
https://www.cve.org/CVERecord?id=CVE-2019-16777
https://www.npmjs.com/advisories/1437
https://www.oracle.com/security-alerts/cpujan2020.html
|
| npm |
CVE-2016-3956 |
MEDIUM |
1.4.29 |
>= 2.15.1 <= 3.0.0, >= 3.8.3 |
http://blog.npmjs.org/post/142036323955/fixing-a-bearer-token-vulnerability
http://www-01.ibm.com/support/docview.wss?uid=swg21980827
https://access.redhat.com/security/cve/CVE-2016-3956
https://github.com/advisories/GHSA-m5h6-hr3q-22h5
https://github.com/npm/npm/commit/f67ecad59e99a03e5aad8e93cd1a086ae087cb29
https://github.com/npm/npm/commit/fea8cc92cee02c720b58f95f14d315507ccad401
https://github.com/npm/npm/issues/8380
https://nodejs.org/en/blog/vulnerability/npm-tokens-leak-march-2016
https://nodejs.org/en/blog/vulnerability/npm-tokens-leak-march-2016/
https://nodesecurity.io/advisories/98
https://nvd.nist.gov/vuln/detail/CVE-2016-3956
https://www.cve.org/CVERecord?id=CVE-2016-3956
https://www.npmjs.com/advisories/98
|
| npm |
CVE-2020-15095 |
MEDIUM |
1.4.29 |
6.14.6 |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html
https://access.redhat.com/security/cve/CVE-2020-15095
https://errata.almalinux.org/8/ALSA-2021-0548.html
https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07
https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc
https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp
https://linux.oracle.com/cve/CVE-2020-15095.html
https://linux.oracle.com/errata/ELSA-2021-0548.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6
https://nvd.nist.gov/vuln/detail/CVE-2020-15095
https://security.gentoo.org/glsa/202101-07
https://www.cve.org/CVERecord?id=CVE-2020-15095
|
| npm-user-validate |
CVE-2020-7754 |
HIGH |
0.1.0 |
1.0.1 |
https://access.redhat.com/security/cve/CVE-2020-7754
https://errata.almalinux.org/8/ALSA-2021-0551.html
https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e
https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p
https://linux.oracle.com/cve/CVE-2020-7754.html
https://linux.oracle.com/errata/ELSA-2021-0551.html
https://nvd.nist.gov/vuln/detail/CVE-2020-7754
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353
https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352
https://www.cve.org/CVERecord?id=CVE-2020-7754
|
| npm-user-validate |
GHSA-xgh6-85xh-479p |
LOW |
0.1.0 |
1.0.1 |
https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p
|
| npmconf |
NSWG-ECO-431 |
HIGH |
1.1.8 |
>=2.1.3 |
https://hackerone.com/reports/320269
|
| npmconf |
GHSA-57cf-349j-352g |
MEDIUM |
1.1.8 |
2.1.3 |
https://hackerone.com/reports/320269
https://www.npmjs.com/advisories/653
|
| qs |
CVE-2017-1000048 |
HIGH |
1.2.2 |
6.0.4, 6.1.2, 6.2.3, 6.3.2 |
https://access.redhat.com/errata/RHSA-2017:2672
https://access.redhat.com/security/cve/CVE-2017-1000048
https://github.com/ljharb/qs
https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d
https://github.com/ljharb/qs/issues/200
https://nvd.nist.gov/vuln/detail/CVE-2017-1000048
https://snyk.io/vuln/npm:qs:20170213
https://www.cve.org/CVERecord?id=CVE-2017-1000048
https://www.npmjs.com/advisories/1469
|
| qs |
CVE-2022-24999 |
HIGH |
1.2.2 |
6.10.3, 6.9.7, 6.8.3, 6.7.3, 6.6.1, 6.5.3, 6.4.1, 6.3.3, 6.2.4 |
https://access.redhat.com/errata/RHSA-2023:0050
https://access.redhat.com/security/cve/CVE-2022-24999
https://bugzilla.redhat.com/2044591
https://bugzilla.redhat.com/2066009
https://bugzilla.redhat.com/2134609
https://bugzilla.redhat.com/2140911
https://bugzilla.redhat.com/2150323
https://errata.almalinux.org/8/ALSA-2023-0050.html
https://github.com/expressjs/express/releases/tag/4.17.3
https://github.com/ljharb/qs
https://github.com/ljharb/qs/commit/4310742efbd8c03f6495f07906b45213da0a32ec
https://github.com/ljharb/qs/commit/727ef5d34605108acb3513f72d5435972ed15b68
https://github.com/ljharb/qs/commit/73205259936317b40f447c5cdb71c5b341848e1b
https://github.com/ljharb/qs/commit/8b4cc14cda94a5c89341b77e5fe435ec6c41be2d
https://github.com/ljharb/qs/commit/ba24e74dd17931f825adb52f5633e48293b584e1
https://github.com/ljharb/qs/commit/e799ba57e573a30c14b67c1889c7c04d508b9105
https://github.com/ljharb/qs/commit/ed0f5dcbef4b168a8ae299d78b1e4a2e9b1baf1f
https://github.com/ljharb/qs/commit/f945393cfe442fe8c6e62b4156fd35452c0686ee
https://github.com/ljharb/qs/commit/fc3682776670524a42e19709ec4a8138d0d7afda
https://github.com/ljharb/qs/pull/428
https://github.com/n8tz/CVE-2022-24999
https://linux.oracle.com/cve/CVE-2022-24999.html
https://linux.oracle.com/errata/ELSA-2023-0050.html
https://lists.debian.org/debian-lts-announce/2023/01/msg00039.html
https://nvd.nist.gov/vuln/detail/CVE-2022-24999
https://security.netapp.com/advisory/ntap-20230908-0005/
https://www.cve.org/CVERecord?id=CVE-2022-24999
|
| request |
CVE-2017-16026 |
MEDIUM |
2.42.0 |
2.68.0 |
https://access.redhat.com/security/cve/CVE-2017-16026
https://github.com/request/request
https://github.com/request/request/commit/29d81814bc16bc79cb112b4face8be6fc00061dd
https://github.com/request/request/issues/1904
https://github.com/request/request/pull/2018
https://github.com/request/request/pull/2022
https://nodesecurity.io/advisories/309
https://nvd.nist.gov/vuln/detail/CVE-2017-16026
https://www.cve.org/CVERecord?id=CVE-2017-16026
|
| request |
CVE-2023-28155 |
MEDIUM |
2.42.0 |
|
https://doyensec.com/resources/Doyensec_Advisory_RequestSSRF_Q12023.pdf
https://github.com/cypress-io/request/blob/master/lib/redirect.js#L116
https://github.com/cypress-io/request/commit/c5bcf21d40fb61feaff21a0e5a2b3934a440024f
https://github.com/cypress-io/request/pull/28
https://github.com/cypress-io/request/releases/tag/v3.0.0
https://github.com/github/advisory-database/pull/2500
https://github.com/request/request
https://github.com/request/request/blob/master/lib/redirect.js#L111
https://github.com/request/request/issues/3442
https://github.com/request/request/pull/3444
https://nvd.nist.gov/vuln/detail/CVE-2023-28155
https://security.netapp.com/advisory/ntap-20230413-0007
https://security.netapp.com/advisory/ntap-20230413-0007/
|
| request |
NSWG-ECO-309 |
MEDIUM |
2.42.0 |
>=2.68.0 |
https://github.com/request/request/issues/1904
https://github.com/request/request/pull/2018
|
| semver |
CVE-2015-8855 |
MEDIUM |
2.3.0 |
>=4.3.2 |
http://www.openwall.com/lists/oss-security/2016/04/20/11
http://www.securityfocus.com/bid/86957
https://access.redhat.com/security/cve/CVE-2015-8855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8855
https://github.com/advisories/GHSA-x6fg-f45m-jf5q
https://github.com/npm/npm/releases/tag/v2.7.5
https://nodesecurity.io/advisories/31
https://nodesecurity.io/advisories/semver_redos
https://nvd.nist.gov/vuln/detail/CVE-2015-8855
https://www.cve.org/CVERecord?id=CVE-2015-8855
https://www.npmjs.com/advisories/31
https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS
|
| semver |
CVE-2022-25883 |
MEDIUM |
2.3.0 |
7.5.2, 6.3.1, 5.7.2 |
https://access.redhat.com/errata/RHSA-2023:5363
https://access.redhat.com/security/cve/CVE-2022-25883
https://bugzilla.redhat.com/2216475
https://bugzilla.redhat.com/2230948
https://bugzilla.redhat.com/2230955
https://bugzilla.redhat.com/2230956
https://errata.almalinux.org/9/ALSA-2023-5363.html
https://github.com/advisories/GHSA-c2qf-rxjj-qqgw
https://github.com/npm/node-semver
https://github.com/npm/node-semver/blob/main/classes/range.js#L97-L104
https://github.com/npm/node-semver/blob/main/classes/range.js%23L97-L104
https://github.com/npm/node-semver/blob/main/internal/re.js#L138
https://github.com/npm/node-semver/blob/main/internal/re.js#L160
https://github.com/npm/node-semver/blob/main/internal/re.js%23L138
https://github.com/npm/node-semver/blob/main/internal/re.js%23L160
https://github.com/npm/node-semver/commit/2f8fd41487acf380194579ecb6f8b1bbfe116be0
https://github.com/npm/node-semver/commit/717534ee353682f3bcf33e60a8af4292626d4441
https://github.com/npm/node-semver/commit/928e56d21150da0413a3333a3148b20e741a920c
https://github.com/npm/node-semver/pull/564
https://github.com/npm/node-semver/pull/585
https://github.com/npm/node-semver/pull/593
https://linux.oracle.com/cve/CVE-2022-25883.html
https://linux.oracle.com/errata/ELSA-2023-5363.html
https://nvd.nist.gov/vuln/detail/CVE-2022-25883
https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795
https://www.cve.org/CVERecord?id=CVE-2022-25883
|
| stringstream |
CVE-2018-21270 |
MEDIUM |
0.0.4 |
0.0.6 |
https://access.redhat.com/security/cve/CVE-2018-21270
https://github.com/mhart/StringStream/blob/v0.0.5/stringstream.js#L32
https://github.com/mhart/StringStream/issues/7
https://hackerone.com/reports/321670
https://nvd.nist.gov/vuln/detail/CVE-2018-21270
https://www.cve.org/CVERecord?id=CVE-2018-21270
https://www.npmjs.com/advisories/664
|
| stringstream |
NSWG-ECO-422 |
MEDIUM |
0.0.4 |
>=0.0.6 |
https://github.com/mhart/StringStream/blob/v0.0.5/stringstream.js#L32
https://hackerone.com/reports/321670
|
| tar |
CVE-2015-8860 |
HIGH |
1.0.1 |
>=2.0.0 |
http://www.openwall.com/lists/oss-security/2016/04/20/11
https://access.redhat.com/security/cve/CVE-2015-8860
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8860
https://github.com/advisories/GHSA-gfjr-3jmm-4g9v
https://github.com/npm/npm
https://github.com/npm/npm/releases/tag/v2.7.5
https://nodesecurity.io/advisories/57
https://nvd.nist.gov/vuln/detail/CVE-2015-8860
https://www.cve.org/CVERecord?id=CVE-2015-8860
https://www.npmjs.com/advisories/57
|
| tar |
CVE-2018-20834 |
HIGH |
1.0.1 |
4.4.2, 2.2.2 |
https://access.redhat.com/errata/RHSA-2019:1821
https://access.redhat.com/security/cve/CVE-2018-20834
https://github.com/isaacs/node-tar
https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d
https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8
https://github.com/npm/node-tar/commits/v2.2.2
https://github.com/npm/node-tar/compare/58a8d43...a5f7779
https://hackerone.com/reports/344595
https://nvd.nist.gov/vuln/detail/CVE-2018-20834
https://www.cve.org/CVERecord?id=CVE-2018-20834
|
| tar |
CVE-2021-32804 |
HIGH |
1.0.1 |
3.2.2, 4.4.14, 5.0.6, 6.1.1 |
https://access.redhat.com/security/cve/CVE-2021-32804
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://errata.almalinux.org/8/ALSA-2021-3666.html
https://github.com/npm/node-tar
https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4
https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9
https://linux.oracle.com/cve/CVE-2021-32804.html
https://linux.oracle.com/errata/ELSA-2021-3666.html
https://nvd.nist.gov/vuln/detail/CVE-2021-32804
https://www.cve.org/CVERecord?id=CVE-2021-32804
https://www.npmjs.com/advisories/1770
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tar |
CVE-2021-37713 |
HIGH |
1.0.1 |
4.4.18, 5.0.10, 6.1.9 |
https://access.redhat.com/security/cve/CVE-2021-37713
https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
https://github.com/isaacs/node-tar/commit/52b09e309bcae0c741a7eb79a17ef36e7828b946
https://github.com/isaacs/node-tar/commit/82eac952f7c10765969ed464e549375854b26edc
https://github.com/isaacs/node-tar/commit/875a37e3ec031186fc6599f6807341f56c584598
https://github.com/npm/node-tar
https://github.com/npm/node-tar/security/advisories/GHSA-5955-9wpr-37jh
https://nvd.nist.gov/vuln/detail/CVE-2021-37713
https://www.cve.org/CVERecord?id=CVE-2021-37713
https://www.npmjs.com/package/tar
https://www.oracle.com/security-alerts/cpuoct2021.html
|
| tough-cookie |
CVE-2016-1000232 |
HIGH |
0.12.1 |
>=2.3.0 |
https://access.redhat.com/errata/RHSA-2016:2101
https://access.redhat.com/errata/RHSA-2017:2912
https://access.redhat.com/security/cve/CVE-2016-1000232
https://access.redhat.com/security/cve/cve-2016-1000232
https://github.com/advisories/GHSA-qhv9-728r-6jqg
https://github.com/salesforce/tough-cookie
https://github.com/salesforce/tough-cookie/commit/615627206357d997d5e6ff9da158997de05235ae
https://github.com/salesforce/tough-cookie/commit/e4fc2e0f9ee1b7a818d68f0ac7ea696f377b1534
https://nodesecurity.io/advisories/130
https://nvd.nist.gov/vuln/detail/CVE-2016-1000232
https://www.cve.org/CVERecord?id=CVE-2016-1000232
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-affected-by-node-js-tough-cookie-module-vulnerability-to-a-denial-of-service-cve-2016-1000232
https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-affected-by-node-js-tough-cookie-module-vulnerability-to-a-denial-of-service-cve-2016-1000232/
https://www.npmjs.com/advisories/130
|
| tough-cookie |
CVE-2017-15010 |
HIGH |
0.12.1 |
2.3.3 |
http://www.securityfocus.com/bid/101185
https://access.redhat.com/errata/RHSA-2017:2912
https://access.redhat.com/errata/RHSA-2017:2913
https://access.redhat.com/errata/RHSA-2018:1263
https://access.redhat.com/errata/RHSA-2018:1264
https://access.redhat.com/security/cve/CVE-2017-15010
https://github.com/advisories/GHSA-g7q5-pjjr-gqvp
https://github.com/salesforce/tough-cookie
https://github.com/salesforce/tough-cookie/commit/f1ed420a6a92ea7a5418df6e39e676556bc0c71d
https://github.com/salesforce/tough-cookie/issues/92
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT
https://nodesecurity.io/advisories/525
https://nvd.nist.gov/vuln/detail/CVE-2017-15010
https://snyk.io/vuln/npm:tough-cookie:20170905
https://www.cve.org/CVERecord?id=CVE-2017-15010
https://www.npmjs.com/advisories/525
|
| tough-cookie |
CVE-2023-26136 |
MEDIUM |
0.12.1 |
4.1.3 |
https://access.redhat.com/security/cve/CVE-2023-26136
https://github.com/salesforce/tough-cookie
https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e
https://github.com/salesforce/tough-cookie/issues/282
https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3
https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ/
https://nvd.nist.gov/vuln/detail/CVE-2023-26136
https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873
https://www.cve.org/CVERecord?id=CVE-2023-26136
|
| tunnel-agent |
GHSA-xc7v-wxcw-j472 |
MEDIUM |
0.4.0 |
0.6.0 |
https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4
https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0
https://www.npmjs.com/advisories/598
|
| tunnel-agent |
NSWG-ECO-393 |
MEDIUM |
0.4.0 |
>=0.6.0 |
https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4
https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0
|
| No Misconfigurations found |
| hpack |
CVE-2016-6581 |
HIGH |
2.1.1 |
2.3.0 |
http://python-hyper.org/projects/hpack/en/stable/security/CVE-2016-6581.html
http://www.securityfocus.com/bid/92315
https://github.com/advisories/GHSA-ffq8-576r-v26g
https://github.com/python-hyper/hpack
https://nvd.nist.gov/vuln/detail/CVE-2016-6581
https://python-hyper.org/hpack/en/latest/security/CVE-2016-6581.html
|
| No Misconfigurations found |